Deception Techniques as Part of Intrusion Detection Strategy

Intrusion Detection Systems (IDS) are used to help the Security Analyst detect unauthorized or suspicious activity inside a network and on Endpoints (servers, workstations). An early stage in the Hackers methodology uses Active Recon on the network to find other machines they can pivot to and...
By Colm Kennedy
August 1, 2016

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg