1-What is/are Intrusion detection and Prevention software? What is the function of Host Based IDS? What is the function of Network Based IDS?
2-Identify and briefly describe 2 most effective IDS for 2021.
3- Your company has recently started adopting formal security policies to comply with several state regulations. One of the security policies states that certain hardware is vital to the organization. As part of this security policy, you must ensure that you have the required number of components plus one extra to plug into any system in case of failure. Which strategy is this policy demonstrating? Some considerations, not all of which apply to good policy in this instance, include fault tolerance, cold site, server redundancy, clustering. Do additional research as required to address this prompt.