Intrusion Detection Policy

All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an unauthorized intrusion of some kind.

All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an unauthorized intrusion of some kind. This is the state of the world’s current security environment and for the most part enterprises, especially well-managed ones, have come to terms with this fate while also doing their best to reduce risks and prepare for how to handle such security incidents.

A clear and concise plan of action will help counteract any intrusion into an enterprise network and mitigate potential damage. This policy from TechRepublic Premium establishes guidelines and procedures your organization can follow when your computer network is compromised.

From the policy:

ANALYZE REQUIREMENTS FOR IMPLEMENTING INTRUSION DETECTION TECHNIQUES

Intrusions will be detected using two techniques, either separately or in collaboration with each other, using what is known as network or host-based detection.

Network-based intrusion detection involves a network device that looks at company network traffic for suspicious patterns. When suspicious patterns in traffic are noticed, an administrator is notified automatically.

This download includes a PDF and Word document.

Previously priced at $99, this is now available to download for $29. Or free with Premium annual subscription: click here to find out more.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.