Intrusion Detection with MOM - Going Above the Wire
There are several areas, or layers, where intrusions into a system can occur. At the 'wire' or network layer there are several tools that can successfully discern the nature of traffic for most commercial protocols. But how do you respond to the challenge of knowing what happens when you need to...