Читать книгу Integration of Cloud Computing with Internet of Things - Группа авторов - Страница 51

2.7.8 Sensing of Infringement

Оглавление

Intruders use various techniques to breach the computer’s protection. Intrusion detection checks incoming system signature data and notifies you when these attempts are detected. With intrusion detection, you can see what a hacker wants to do to hack your computer.

Notifications help you to see what’s going on your firewall and to warn you of potential intrusion attempts on your device in different ways.

Integration of Cloud Computing with Internet of Things

Подняться наверх