Intrusion Prevention Fundamentals (part 4)
An intrusion prevention pystem (IPS) is a security protection device or application that acts as a Layer 2 forwarding device to protect network devices from attack.
Part Four: Evolution of Attack Mitigation
Intrusion Prevention Fundamentals (Part 3)
An intrusion prevention pystem (IPS) is a security protection device or application that acts as a Layer 2 forwarding device to protect network devices from attack.
Part Three: Attack Examples from the Real World
Intrusion Prevention Fundamentals (Part 2)
An intrusion prevention pystem (IPS) is a security protection device or application that acts as a Layer 2 forwarding device to protect network devices from attack.
Part Two: Target Value, Attack Characteristics and Attack Delivery Mechanisms
Intrusion Prevention Fundamentals (Part 1)
An intrusion prevention pystem (IPS) is a security protection device or application that acts as a Layer 2 forwarding device to protect network devices from attack.
Part 1: Evolution of Computer Security Threats
Tech Buzzword: What is spear phishing?
Spear phishing is an e-mail spoof used to target a specific organization and seek unauthorized access to confidential data. The source of the e-mail appears to be from an individual within the recipient's own company -- generally someone in a position of authority.
Listen to this podcast now