From d58c087deb084ea4da72fb1c87f66be14dde851e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jes=C3=BAs=20Enrique=20Alcal=C3=A1=20Rojas?= Date: Wed, 4 Sep 2024 04:05:30 -0400 Subject: [PATCH] add content hips@l5EnhOCnkN-RKvgrS9ylH.md (#6832) * add content hips@l5EnhOCnkN-RKvgrS9ylH.md * Update src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md --------- Co-authored-by: dsh --- .../cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md b/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md index e69de29bb..967bc2720 100644 --- a/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md +++ b/src/data/roadmaps/cyber-security/content/hips@l5EnhOCnkN-RKvgrS9ylH.md @@ -0,0 +1,9 @@ +# Host Intrusion Prevention System (HIPS) + +A Host Intrusion Prevention System (HIPS) is a security solution designed to monitor and protect individual host devices, such as servers, workstations, or laptops, from malicious activities and security threats. HIPS actively monitors system activities and can detect, prevent, and respond to unauthorized or anomalous behavior by employing a combination of signature-based, behavior-based, and heuristic detection methods. + +HIPS operates at the host level, providing a last line of defense by securing the individual endpoints within a network. It is capable of preventing a wide range of attacks, including zero-day exploits, malware infections, unauthorized access attempts, and policy violations. + +Visit the following resources to learn more: +- [@article@What is an Intrusion Prevention System?](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips) +- [@article@What is Host intrusion prevention system (HIPS)?](https://cyberpedia.reasonlabs.com/EN/host%20intrusion%20prevention%20system%20(hips).html)