Skip to main content

Session 4: Transitioning to the IoE

Completion requirements
View all sections of the document

The figure shows how an IPS works. Data travels from a user to the IPS sensor which compares the traffic with known malicious signatures. The sensor drops any data that it dtermines is maicious. The management concols logs the events.

 4.3.4 Security devices