By way of example, an IDS may well hope to detect a trojan on port 12345. If an attacker experienced reconfigured it to employ a different port, the IDS may not be able to detect the presence from the trojan. Ensure you have a sound ID and proof of address https://zanerttst.thenerdsblog.com/39387547/5-essential-elements-for-ids