{"version":"1.0","provider_name":"Information Security Blog - 7Security","provider_url":"https:\/\/www.7sec.com\/blog","author_name":"madmin","author_url":"https:\/\/www.7sec.com\/blog\/author\/madmin\/","title":"The Purpose of Intrusion Detection & Prevention Systems - Information Security Blog - 7Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"E5YBv8K6zD\"><a href=\"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/\">The Purpose of Intrusion Detection &#038; Prevention Systems<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.7sec.com\/blog\/the-purpose-of-intrusion-detection-and-prevention-systems\/embed\/#?secret=E5YBv8K6zD\" width=\"600\" height=\"338\" title=\"&#8220;The Purpose of Intrusion Detection &#038; Prevention Systems&#8221; &#8212; Information Security Blog - 7Security\" data-secret=\"E5YBv8K6zD\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.7sec.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Intrusion Detection System (IDS) is a detective device designed to detect malicious (including policy-violating) actions. An Intrusion Prevention System (IPS) is primarily a preventive device designed not only to detect but also to block malicious actions. Depending on their physical location in the infrastructure, and the scope of protection required, the IDS and IPS fall &hellip; Continue reading \"\"","thumbnail_url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/09\/ids.png"}