ACTIVE VS. PASSIVE NIDSS VII. SIGNATURES VIII. FALSE POSITIVES AND...

3.

Active vs. Passive NIDSs

vii.

Signatures

viii.

False Positives and Negatives

ix.

IDS Models

x.

Intrusion Prevention Systems

xi.

Honeypots and Honeynets

xii.

Firewalls

xiii.

Proxy Servers

xiv.

Internet Content Filters

xv.

Protocol Analyzers

xvi.

Network Mappers

xvii.

Anti-spam

ƒ

Types of Attacks and Malicious Software

i.

Avenues of Attack.