A company's Chief Information Officer wants to implement IDS software onto the current system's architecture to provide an additional layer of security. The software must be able to monitor system activity, provide information on attempted attacks, and provide analysis of malicious activities to determine the processes or users involved.
Which of the following would provide this information?
beanbag
Highly Voted 1 year, 8 months agosh4dali
Highly Voted 1 year, 7 months agoMeep123
7 months, 3 weeks agoBiteSize
Most Recent 10 months agodangerelchulo
1 year, 8 months agoadamwella
1 year, 7 months agoukuwai
1 year, 8 months ago