Can a company use an intrusion detection or intrusion prevention system to block unintended access via peer-to-peer sharing?  Why or why not?

CMPTR
3rd Edition
ISBN:9781337681872
Author:PINARD
Publisher:PINARD
Chapter6: Security And Privacy
Section: Chapter Questions
Problem 2QY
icon
Related questions
Question

Can a company use an intrusion detection or intrusion prevention system to block unintended access via peer-to-peer sharing?  Why or why not?

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Security Techniques and tools
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
CMPTR
CMPTR
Computer Science
ISBN:
9781337681872
Author:
PINARD
Publisher:
Cengage
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781285867168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning