1 00:00:00,540 --> 00:00:05,350 In the last lecture, we talked about the firewall's and I also told you how far the world works. 2 00:00:05,850 --> 00:00:11,810 We also had an introduction to the demilitarized zones in the upcoming sections of these courses. 3 00:00:12,150 --> 00:00:18,780 I'm going to explain in brief about the working exact working of firewall's Hovell delivers packets 4 00:00:18,780 --> 00:00:21,390 and removes the unwanted scam's and all those things. 5 00:00:21,840 --> 00:00:27,930 But for this section, for networking devices section, you just have to understand what a firewall 6 00:00:27,930 --> 00:00:29,660 is and how it performs. 7 00:00:30,060 --> 00:00:34,500 Now, in this lecture, we are going to talk about the intrusion detection system. 8 00:00:34,500 --> 00:00:38,850 That is the ideas and the intrusion prevention system that is the IS. 9 00:00:39,420 --> 00:00:46,170 Now, note that these two systems are totally different or do they have some similar functionality between 10 00:00:46,170 --> 00:00:46,440 them? 11 00:00:47,560 --> 00:00:55,330 So what is an ideas idea stands for intrusion detection system from the name, you can guess that intrusion 12 00:00:55,480 --> 00:01:00,350 detection system, if something is trying to get into your network. 13 00:01:00,670 --> 00:01:04,180 This system will detect it and notify you. 14 00:01:05,140 --> 00:01:06,410 That's it, you got it. 15 00:01:06,550 --> 00:01:11,230 This is the example of this is the definition of intrusion detection system. 16 00:01:11,590 --> 00:01:18,520 If an attacker is trying to enter into a network, ideas will detect it and notify to you that is the 17 00:01:18,520 --> 00:01:19,870 intrusion detection system. 18 00:01:21,340 --> 00:01:28,300 And intrusion prevention system, so now you might have guessed from the definition of intrusion detection 19 00:01:28,300 --> 00:01:31,850 system, what is an intrusion prevention system, right. 20 00:01:32,140 --> 00:01:36,950 So as the name suggests, intrusion prevention system is prevention. 21 00:01:36,980 --> 00:01:39,480 Now, look at the word prevention. 22 00:01:40,150 --> 00:01:45,580 So this device will stop someone or something from entering into your network. 23 00:01:46,180 --> 00:01:46,850 That's right. 24 00:01:47,380 --> 00:01:52,080 So ideas and apps are very important in today's networks. 25 00:01:52,450 --> 00:01:59,110 They are the network security appliances that monitor the networks and packets for malicious activity 26 00:02:00,070 --> 00:02:03,430 and ideas is considered as a monitored more device. 27 00:02:03,700 --> 00:02:10,510 And it just records and tells you about your problems, whereas an IPS can work in real time to stop 28 00:02:10,510 --> 00:02:11,070 threats. 29 00:02:11,620 --> 00:02:16,660 So ideas is just like a security guard, which is just trying to tell you. 30 00:02:16,780 --> 00:02:17,240 Right. 31 00:02:18,220 --> 00:02:20,530 You know, this person is trying to enter. 32 00:02:20,680 --> 00:02:28,350 Please do whatever you can, but as an IPS can work as a doc security dog, which actually prevents 33 00:02:28,360 --> 00:02:32,530 or box on the attacker and stops him from entering into your network. 34 00:02:33,760 --> 00:02:41,560 Now the main difference between the ideas and the IPS is that intrusion prevention system works in line 35 00:02:41,560 --> 00:02:47,620 to actively prevent and block the intrusions that are detected based on the rules you set up. 36 00:02:48,070 --> 00:02:52,060 In the last lecture, we had talked about the rule setting in case of the firewalls. 37 00:02:52,390 --> 00:02:53,890 The same thing applies here. 38 00:02:54,670 --> 00:03:01,600 Intrusion prevention systems can send an alarm or create a correlation rules and remediation. 39 00:03:01,870 --> 00:03:03,490 They can drop malicious packets. 40 00:03:03,760 --> 00:03:09,100 They can provide malware protection and reset the connection of offending sauce hosts. 41 00:03:10,090 --> 00:03:11,350 I hope this was clear. 42 00:03:11,350 --> 00:03:14,050 If you have any doubts, please feel free to ask us. 43 00:03:15,070 --> 00:03:20,140 Now let us have a look at each ileus host based intrusion detection system. 44 00:03:20,380 --> 00:03:20,910 What is it? 45 00:03:20,950 --> 00:03:24,550 Ideas in a host based intrusion detection system. 46 00:03:24,880 --> 00:03:32,620 Software runs on one computer to detect abnormalities on that system alone by monitoring applications, 47 00:03:32,770 --> 00:03:35,100 system logs and even clocks. 48 00:03:35,950 --> 00:03:40,330 Now, HIV AIDS does not directly monitor system network traffic. 49 00:03:41,440 --> 00:03:48,850 Also, its ideas are mostly implemented on servers because they are able to manage its spread across 50 00:03:48,850 --> 00:03:50,680 a large computer on the network. 51 00:03:51,280 --> 00:03:52,740 Plus, if A. 52 00:03:53,110 --> 00:04:01,210 S Ideas database is on the local computer and its data becomes compromised by an attack, the ideas 53 00:04:01,210 --> 00:04:02,340 could be corrupted. 54 00:04:03,940 --> 00:04:10,390 So as far as this letter is concerned, you just have to remember the full form of ideas, ideas. 55 00:04:10,810 --> 00:04:14,440 Then you have to remember the difference between ideas and ideas. 56 00:04:14,860 --> 00:04:21,070 And let me remind you that IPPs works in life environment to prevent the malicious activities. 57 00:04:21,370 --> 00:04:26,890 But as ideas just notifies you if there is something malicious happening on your network. 58 00:04:27,610 --> 00:04:31,360 Now, in the next lecture, we are going to talk about access points. 59 00:04:31,360 --> 00:04:34,900 You have heard of access points, but if you are not sure, what does that mean? 60 00:04:35,290 --> 00:04:38,080 Make sure you understand and attend the next lecture.