{"id":3720,"date":"2016-10-21T20:43:33","date_gmt":"2016-10-22T00:43:33","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3720"},"modified":"2016-10-21T20:43:33","modified_gmt":"2016-10-22T00:43:33","slug":"how-to-install-advanced-intrusion-detection-environment-on-centos","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/21\/how-to-install-advanced-intrusion-detection-environment-on-centos\/","title":{"rendered":"How to install Advanced Intrusion Detection Environment on CentOS"},"content":{"rendered":"<p>We often cover topics about IDSs in class. It is a\u00a0system(s)\u00a0embedded within computer networks against malicious activities or policy violations. For example, an IDS infrastructure does so by analyzing incoming network traffic. However, this article titled \u201cHow to install Advanced Intrusion Detection Environment on CentOS\u201d that I\u2019m sharing with you provides a broader prospect about IDS, the Advanced\u00a0Intrusion Detection Environment.<\/p>\n<p>AIDE was developed to replace Tripwire licensed under the terms of the GNU General Public License (GPL). According to author of the article, \u00a0Jack Wallen, AIDE is recommended for better I.T. Security because it serves as a supplement layer of protection for CentOS environments. For those who might be interested in learning how to deploy AIDE on a network platform the correct way, here are some detailed instruction materials of how to install AIDE on CentOS.<\/p>\n<p>Access the full article via the link below:<\/p>\n<p><a href=\"http:\/\/www.techrepublic.com\/article\/how-to-install-advanced-intrusion-detection-environment-on-centos\/\">http:\/\/www.techrepublic.com\/article\/how-to-install-advanced-intrusion-detection-environment-on-centos\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We often cover topics about IDSs in class. It is a\u00a0system(s)\u00a0embedded within computer networks against malicious activities or policy violations. For example, an IDS infrastructure does so by analyzing incoming network traffic. However, this article titled \u201cHow to install Advanced Intrusion Detection Environment on CentOS\u201d that I\u2019m sharing with you provides a broader prospect about [&hellip;]<\/p>\n","protected":false},"author":11666,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[722304],"tags":[],"class_list":{"0":"post-3720","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-08-it-services-quality","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11666"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3720"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3720\/revisions"}],"predecessor-version":[{"id":3721,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3720\/revisions\/3721"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}