Temple University

Week 13 Reading and In the News

Intrusion Prevention System (IPS) are network security appliances which inspect data and flow of network traffic.   This appliances is configured to detect or prevent malicious activity targeting systems. The assigned reading lists various methods used to circumvent or bypass the different types of intrusion presention systems in the marketplace. The following are very effective methods; Obfuscation, Encryption and tunneling,  Fragmentation and Protocol Violations.  Quite often several of these methods are combined or requeired to circumvent the intrusion presevention system of a target.

 

In the NEWS:Why Banks Need to Prepare for More Chase-Like Breaches

http://www.databreachtoday.com/interviews/banks-need-to-prepare-for-more-chase-like-breaches-i-2980

Leave a Reply

Your email address will not be published. Required fields are marked *