<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IDS Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/ids/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/ids/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 08 Oct 2020 18:46:36 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>IDS Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/ids/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 049 Intrusion Detection Systems</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-049-intrusion-detection-systems/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 08 Oct 2020 23:05:37 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Honeypot]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[Intrusion Detection]]></category>
		<category><![CDATA[Intrusion Detection System]]></category>
		<category><![CDATA[Intrusion Detection Systems]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2337</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 49. This week we&#8217;re going to talk about Intrusion Detection Systems. What are intrusion detection systems? An intrusion detection system, or IDS, is either a device or a piece of software that sits on the network and analyses the data that flows across that network. It looks for signs that there&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-049-intrusion-detection-systems/">#WeekendWisdom 049 Intrusion Detection Systems</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 49. This week we&#8217;re going to talk about Intrusion Detection Systems.<span id="more-2337"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2337-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/10/WeekendWisdom-049-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/10/WeekendWisdom-049-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/10/WeekendWisdom-049-lo.mp4</a></video></div>
<h3>What are intrusion detection systems?</h3>
<p>An intrusion detection system, or IDS, is either a device or a piece of software that sits on the network and analyses the data that flows across that network. It looks for signs that there might be an intruder, hackers or something that might be on the network or some piece of software that&#8217;s doing something malicious on the network.</p>
<h3>How does an IDS work?</h3>
<p>It can detect these by using techniques such as, like what an anti-virus application uses, it looks for a signature. So if a specific type of malicious software that is sitting on the network might be extracting data from your network. That has a certain behaviour. It might have a certain signature that the IDS can pick up on.</p>
<p>Similarly, using techniques like machine learning an IDS might be able to look for anomalous behaviour. So if a database server is suddenly sending lots of data to another host or outside the network unexpectedly, that anomalous behaviour could be detected by the IDS and reported on.</p>
<h3>Anything else?</h3>
<p>There also other devices which are called honeypots which can enhance an IDS. A honeypot will look like a very, very vulnerable device, maybe a vulnerable email server. If the hackers scan that and try and penetrate that honeypot that will trigger an alert because nothing should be scanning that device.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-049-intrusion-detection-systems/">#WeekendWisdom 049 Intrusion Detection Systems</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/10/WeekendWisdom-049-lo.mp4" length="29990734" type="video/mp4" />

			</item>
	</channel>
</rss>
