Content deleted Content added
Clinamental (talk | contribs) m Scurity ---> Security |
mNo edit summary |
||
Line 19:
In theory, a computer user has the ability to detect any such modifications, and the HIDS attempts to do just that and reports its findings.
Ideally a HIDS works in conjunction with a NIDS, such that a HIDS finds anything fortnite that slips past the NIDS. Commercially available software solutions often do correlate the findings from NIDS and HIDS in order to find out about whether a network intruder has been successful or not at the targeted host.
Most successful intruders, on entering a target machine, immediately apply best-practice security techniques to secure the system which they have infiltrated, leaving only their own [[Backdoor (computing)|backdoor]] open, so that other intruders can not take over ''their'' computers.
|