From the course: Career Essentials in System Administration by Microsoft and LinkedIn

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Securing the network from attacks

Securing the network from attacks

- [Instructor] Network intrusions can be done silently in the background while a hacker waits for the best time to strike. Or very quickly bringing down a network within a matter of minutes, as computers are infected as fast as possible to avoid any single computer from being shut down from the network. As a CIS admin, it will be your job to prevent intrusions when possible and detect them before they do much harm if they do get through your defenses. A network-based intrusion detection system, or IDS, detects malicious traffic on a network. IDS usually requires promiscuous network access in order to analyze all traffic, including all unicast traffic. Promiscuous mode basically means that it can read or sniff every packet coming in from another network interface. IDS are passive devices that do not interfere with the traffic they monitor. The IDS sniffs the internal interface of the firewall in read only mode and…

Contents