68
Views
6
CrossRef citations to date
0
Altmetric
Linking to Data

Intrusion Detection Technology: Leveraging the Organization's Security Posture

 

Abstract

Information technology executives and managers must have a better understanding of precisely the kind of activity that defines a computer attack, as well as what actions must be taken to effectively counter the vulnerabilities inherent in most networks and systems. the good news is that the damage caused to organizations by malicious hacking or misuse intrusions can be mitigated, and perhaps even deterred, with the implementation of an intrusion detection system; and many organizations have put the acquisition of intrusion detection technology at the forefront of their strategic planning initiatives. Unfortunately, however, many others have not yet realized the risks associated with a weak or inadequate corporate security posture, and have not put into place a viable security plan.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.