Welcome to #WeekendWisdom number 50. This week we’re going to talk about Intrusion Prevention Systems.

Last week we talked about Intrusion Detection Systems or IDS. They have a logical kind of follow on component called an Intrusion Prevention System or IPS.

What are Intrusion Prevention Systems:

An IPS behaves in the same way as an IDS, in that it looks for dodgy traffic or suspicious traffic. Except in the case of an IPS, it will try and block that traffic from doing any damage to the network or devices.

Host Based IPS:

There would be a host based IPS which would be a piece of software usually that sits on a computer that will look for malicious activity and try and prevent it from doing any damage on that computer.

Network IPS:

You would have a network IPS which would be usually a device that sits on the network and would look for any kind of dodgy traffic that goes across the network and again try to prevent it from getting to its destination or doing any damage.

Wireless Network IPS:

There would be a wireless equivalent of that as well which would be different type but same idea but on a wireless network.

Network Behavioural IPS:

Finally you have a network behavioural IPS which would look for kind of the specific dodgy types of traffic going on across the network. So they would look for things like floods of data from a Distributed Denial-Of-Service attack or DDOS attack, trying to flood the network and slow it down. That type of IPS would be able to block that and stop that from happening and not taking down the network.

So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.


How can L2 Cyber Security help you?

We offer a full range of training programmes, which can be delivered online or in-person*.

L2 Cyber Security are also a partner of CyberRiskAware for online self-directed Cyber Security Awareness training and Phishing testing.

Contact us for more information at info@L2CyberSecurity.com.

*With appropriate social distancing and other health and safety measures adhered to.


Follow us on Social media:

Liam is available on TwitterLinkedIn and Instagram.

Follow L2 Cyber on TwitterLinkedInInstagram and Facebook.

© L2 Cyber Security Solutions