Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 7, Problem 6RQ

Explanation of Solution

List of Three control strategies proposed for IDPS:

The below are the list of three control strategies proposed for IDPS (Intrusion Detection and Prevention) and they are:

  • Centralized IDPS control strategy.
  • Fully distributed IDPS control strategy.
  • Partially distributed IDPS control strategy.

Centralized IDPS control strategy:

  • It is an approach where all the control functions are being implemented and managed at a central location.
  • The system gets analyzed along with the network using this strategy, the information about the network are gathered using the control function, and based on that information current situation gets determined.

Fully distributed IDPS control strategy:

  • It is an approach opposite to centralized, where all the control functions are being implemented and applied at the physical location of individual IDPS component...

Blurred answer
Students have asked these similar questions
What are the key functions of IDPS technologies
What is the most effective approach to bypass the security of WPS?
How do "Access Control Lists" (ACLs) enhance security measures in a networked environment?
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,