Joe, a network security engineer, has visibility to network traffic through network monitoring tools.
However, he’s concerned that a disgruntled employee may be targeting a server containing the company’s
financial records. Which of the following security mechanism would be MOST appropriate to confirm Joe’s
A host-based IDS (HIDS) is an intrusion detection system that runs as a service on a host computer system. It
is used to monitor the machine logs, system events, and application activity for signs of intrusion. It is useful for
detecting attacks that originate outside the organization as well as attacks by internal users logged on to the