This is great, the visual example you gave is perfect. I am a noob and starting my journey down this path, and appreciate educational material like this a lot! I liked and subscribed..
I am a Targeted Empowered Individual. I am being notoriously cyber-attacked 24/7 by my neighbor. Compromised network and hardware. Any advice greatly appreciated. Have you folks perhaps assisted T.I.s before? Furthermore my comments are being Shadow-banned. Thank you & GOD bless
So not trolling here but are you on medication or have you ever been on medication and how long have you been online for maybe it's time for you too disconnect and take a nice long walk.
Jibnath, I believe you are mistaken. The firewall should be placed as the first line of defense - it filters packets that, just by their header information, have been deemed undesirable by the network administrator. These can be detected and filtered out quickly. The Intrusion Detection System should then be the second line of defense, coming after the firewall, because it has to perform resource intensive "Deep Packet Inspection". It's better to have it do this on the fewer number of packets that actually get allowed through the firewall, than to have it examine every single packet that comes toward the network, including ones that would just get blocked by the firewall anyways. Otherwise, the IDS might be forced to try to examine too many packets at a time - more than it can successfully investigate, and it would have to let some packets through without inspecting them.
What happens when there are no normal network activities at all and everything I do is hacked 24/7 almost as if an entire cyber team is coming after me because of a meme I made?? What if their zero days and malware are too new to notice???