intrusion prevention

collocation in English

meaningsofintrusionandprevention

These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withpreventionorintrusion.
intrusion
noun[C or U]
uk
/ɪnˈtruː.ʒən/
us
/ɪnˈtruː.ʒən/
an occasion when someone goes into a place or situation where they are not wanted or expected ...
See more atintrusion
prevention
noun[U]
uk
/prɪˈven.ʃən/
us
/prɪˈven.ʃən/
the act of stopping something from happening or of stopping someone from ...
See more atprevention

(Definition ofintrusionandpreventionfrom theCambridge English Dictionary© Cambridge University Press)

Examplesofintrusion prevention

These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
The overarching philosophy driving intrusion detection is that, due to their static nature,intrusionpreventiontechniques such as firewalls and routing filter policies fail to stop many types of attack.
From theCambridge English Corpus
The main differences are, unlike intrusion detection systems,intrusionpreventionsystems are placed in-line and are able to actively prevent/block intrusions that are detected.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The main functions ofintrusionpreventionsystems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Exploits were blocked by theintrusionpreventionsystem, which prevents threats from leveraging vulnerabilities.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Their intended role in defense was in anintrusionpreventionperimeter.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
A respected authority onintrusionpreventionand detection technology and forensics, he is responsible for the technical direction and product development efforts.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
When an intrusion detection system orintrusionpreventionsystem is present on the target network, detection becomes more likely as speed increases.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Manyintrusionpreventiontechnologies use signatures and dynamic configurations that enable a deep inpsection into the payload and sometimes monitoring session streams.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The design features multiple layers of security measures, including encryption andintrusionprevention technologies, to hinder and deter espionage efforts.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
To prevent the installation of rogue access points, organizations can install wirelessintrusionprevention systems to monitor the radio spectrum for unauthorized access points.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
False negative occurs when the wirelessintrusionpreventionsystem fails to detect an access point actually connected to the secure network as wired rogue.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Developer of networking security solutions, particularlyintrusionpreventionsystems.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Zuk was the principal developer of the first stateful inspection firewall and the firstintrusionpreventionsystem.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Intrusionpreventionsystems are considered extensions of intrusion detection systems because they both monitor network traffic and/or system activities for malicious activity.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Intrusionpreventionalso typically requires heavy state retention and maintenance, and make heavy use of dynamic data in memory.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Because of the popularity of this technique, many vendors ofintrusionpreventionsystems will search for this pattern of no-op machine instructions in an attempt to detect shellcode in use.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofintrusion
Go to the definition ofprevention
See other collocations withprevention
See other collocations withintrusion