Closed Eric60691 closed 2 years ago
👋 @Eric60691 Good afternoon and thank you for submitting your topic suggestion. Your topic form has been entered into our queue and should be reviewed (for approval) as soon as a content moderator is finished reviewing the ones in the queue before it.
This topic was rejected because it is oversaturated on numerous blogs. Suggesting the same thing numerous times slows down the process.
Topic Suggestion
[Security] Intrusion Detection and Prevention System
Proposed title of article
[Security] Intrusion Detection and Prevention System
Proposed article introduction
This article seeks to assist organizations in understanding intrusion detection and prevention system (IDPS) technologies and in designing, implementing, configuring, securing, monitoring, and maintaining intrusion detection and prevention systems (IDPS). It provides practical, real-world guidance for each of four classes of IDPS products: network-based, wireless, network behavior analysis, and host-based. This article has been created for computer security staff and program managers, computer security incident response teams (CSIRT), and system and network administrators who are responsible for managing or monitoring IDPS technologies. This article does not assume that the reader has previous experience with any IDPS technologies, but it does assume that the reader has experience with information security.
Key takeaways
• What is IDPS • Why IDPS should be used • Types of IDPSs and where they are Deployed • Performance of IDPSs • Detection methodologies of IDPSs
Article quality
The article will not duplicate what is already in the docs but will apply those ideas to develop new ideas. This article does not assume that the reader has previous experience with any IDPS technologies, but it does assume that the reader has experience with information security.
References
N/A