Skip to main content

Session 4: Transitioning to the IoE

Completion requirements
View all sections of the document

The figure shows how an IPS works. Data travels from a user to the IPS sensor which compares the traffic with known malicious signatures. The sensor drops any data that it dtermines is maicious. The management concols logs the events.