Joe, a network security engineer, has visibility to network traffic through network monitoring tools.
However, he’s concerned that a disgruntled employee may be targeting a server containing the
company’s financial records. Which of the following security mechanism would be MOST
appropriate to confirm Joe’s suspicion?
A.
HIDS
B.
HIPS
C.
NIPS
D.
NIDS