Show
Grant Brunierunread, Aug 22, 2010, 4:36:50 AM8/22/10 to SEC-0130 Summer 2010 1. What common security system is an IDPS most like? I what ways are 2. How does a false positive alarm differ from a false negative one? Elma Hartunianunread, Sep 4, 2010, 12:08:52 PM9/4/10 to Thanks Grant. Nice and easy way to define the IDSP. I appreciate your work
Chapter 7, End of Chapter, Review Questions, Exercise 2 How does a false positive alarm differ from a false negative alarm? From a security perspective, which is less desirable?Verified Answer and ExplanationExplanationng elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel l Sample Responseec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue Related ExercisesThis preview shows page 1 - 2 out of 3 pages. How does a false positive alarm differ from a false negative? From the security perspective,which is least desirable? Get answer to your question and much more What is the most widely accepted biometric authorization technology? Why do you believethis technology is so acceptable to users? Get answer to your question and much more What is the OSI model? Why is the OSI model so important when it comes to networksecurity? Get answer to your question and much more Upload your study docs or become a Course Hero member to access this document Upload your study docs or become a Course Hero member to access this document End of preview. Want to read all 3 pages? Upload your study docs or become a Course Hero member to access this document What is false positive IDS alarm quizlet?False positive - An alarm or alert that indicates that an attack is in progress or that an attack has successfully occurred when in fact these was no such attack.
How does a signature based IDPS differ from a behavior based IDPS quizlet?A signature-based system looks for patterns of behavior that match a library of known behaviors. A behavior-based system watches for activities that suggest an alert-level activity is occurring based on sequences of actions or the timing between otherwise unrelated events.
How does a network based IDPS differ from a host based IDPS?A network-based IDPS runs on network segments, including wireless or any other network that is selected. A host-based IDPS, on the other hand, runs on servers.
What is a honeypot Honeynet padded cell system how do they differ from one another?A padded cell is a honey poi that has been protected so that that it cannot be easily compromised. In other words, a padded cell is a hardened honey pot. In addition to attracting attackers with tempting data, a padded cell operates in tandem with a traditional IDS.
|