intrusion prevention
collocation in Englishmeaningsofintrusionandprevention
These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withpreventionorintrusion.
intrusion
noun[C or U]
uk/ɪnˈtruː.ʒən/us/ɪnˈtruː.ʒən/
an occasion when someone goes into a place or situation where they are not wanted or expected ...
See more atintrusion
prevention
noun[U]
uk/prɪˈven.ʃən/us/prɪˈven.ʃən/
the act of stopping something from happening or of stopping someone from ...
See more atprevention
(Definition ofintrusionandpreventionfrom theCambridge English Dictionary© Cambridge University Press)
Examplesofintrusion prevention
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
The overarching philosophy driving intrusion detection is that, due to their static nature,intrusionpreventiontechniques such as firewalls and routing filter policies fail to stop many types of attack.
From theCambridge English Corpus
The main differences are, unlike intrusion detection systems,intrusionpreventionsystems are placed in-line and are able to actively prevent/block intrusions that are detected.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The main functions ofintrusionpreventionsystems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Exploits were blocked by theintrusionpreventionsystem, which prevents threats from leveraging vulnerabilities.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Their intended role in defense was in anintrusionpreventionperimeter.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
A respected authority onintrusionpreventionand detection technology and forensics, he is responsible for the technical direction and product development efforts.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
When an intrusion detection system orintrusionpreventionsystem is present on the target network, detection becomes more likely as speed increases.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Manyintrusionpreventiontechnologies use signatures and dynamic configurations that enable a deep inpsection into the payload and sometimes monitoring session streams.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The design features multiple layers of security measures, including encryption andintrusionprevention technologies, to hinder and deter espionage efforts.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
To prevent the installation of rogue access points, organizations can install wirelessintrusionprevention systems to monitor the radio spectrum for unauthorized access points.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
False negative occurs when the wirelessintrusionpreventionsystem fails to detect an access point actually connected to the secure network as wired rogue.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Developer of networking security solutions, particularlyintrusionpreventionsystems.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Zuk was the principal developer of the first stateful inspection firewall and the firstintrusionpreventionsystem.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Intrusionpreventionsystems are considered extensions of intrusion detection systems because they both monitor network traffic and/or system activities for malicious activity.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Intrusionpreventionalso typically requires heavy state retention and maintenance, and make heavy use of dynamic data in memory.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Because of the popularity of this technique, many vendors ofintrusionpreventionsystems will search for this pattern of no-op machine instructions in an attempt to detect shellcode in use.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofintrusion
Go to the definition ofprevention
See other collocations withprevention
See other collocations withintrusion