diff --git a/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md b/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md index e69de29bb..967bc2720 100644 --- a/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md +++ b/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md @@ -0,0 +1,9 @@ +# Host Intrusion Prevention System (HIPS) + +A Host Intrusion Prevention System (HIPS) is a security solution designed to monitor and protect individual host devices, such as servers, workstations, or laptops, from malicious activities and security threats. HIPS actively monitors system activities and can detect, prevent, and respond to unauthorized or anomalous behavior by employing a combination of signature-based, behavior-based, and heuristic detection methods. + +HIPS operates at the host level, providing a last line of defense by securing the individual endpoints within a network. It is capable of preventing a wide range of attacks, including zero-day exploits, malware infections, unauthorized access attempts, and policy violations. + +Visit the following resources to learn more: +- [@article@What is an Intrusion Prevention System?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips) +- [@article@What is Host intrusion prevention system (HIPS)?](https://cyberpedia.reasonlabs.com/EN/host%20intrusion%20prevention%20system%20(hips).html)