Who does a false positive alarm differ from a false negative alarm from a security perspective which is less desireable?

Grant Brunier

unread,

Aug 22, 2010, 4:36:50 AM8/22/10

to SEC-0130 Summer 2010

1. What common security system is an IDPS most like? I what ways are
these systems similar?
a. The two systems often coexist, the combined term intrusion
detection/prevention system (IDPS). IDS works like a burglar alarm
in that it detects a violation and activates an alarm.

2. How does a false positive alarm differ from a false negative one?
From a security perspective, which is least desirable?
a. False positives tend to make users insensitive to alarms, and thus
reduce their reactivity to actual intrusion events. The false
positives seem to be the least desirable, A false positive can
sometimes be produced when and IDPS mistakes normal system activity
for an attack

Elma Hartunian

unread,

Sep 4, 2010, 12:08:52 PM9/4/10

to

Thanks Grant. Nice and easy way to define the IDSP. I appreciate your work

  1. All Textbook Solutions
  2. Principles of Information Security (6th Edition)
  3. How does a false positive alarm differ from a false negative alarm? From a security perspective, which is less desirable?

Chapter 7, End of Chapter, Review Questions, Exercise 2

How does a false positive alarm differ from a false negative alarm? From a security perspective, which is less desirable?

Verified Answer and Explanation

Explanation

ng elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel l

Sample Response

ec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue

Related Exercises

  • School Sullivan University
  • Course Title CSC-2020 622
  • Pages 3
  • Ratings 89% (9) 8 out of 9 people found this document helpful

This preview shows page 1 - 2 out of 3 pages.

How does a false positive alarm differ from a false negative? From the security perspective,which is least desirable?

Get answer to your question and much more

What is the most widely accepted biometric authorization technology? Why do you believethis technology is so acceptable to users?

Get answer to your question and much more

What is the OSI model? Why is the OSI model so important when it comes to networksecurity?

Get answer to your question and much more

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 3 pages?

Upload your study docs or become a

Course Hero member to access this document

What is false positive IDS alarm quizlet?

False positive - An alarm or alert that indicates that an attack is in progress or that an attack has successfully occurred when in fact these was no such attack.

How does a signature based IDPS differ from a behavior based IDPS quizlet?

A signature-based system looks for patterns of behavior that match a library of known behaviors. A behavior-based system watches for activities that suggest an alert-level activity is occurring based on sequences of actions or the timing between otherwise unrelated events.

How does a network based IDPS differ from a host based IDPS?

A network-based IDPS runs on network segments, including wireless or any other network that is selected. A host-based IDPS, on the other hand, runs on servers.

What is a honeypot Honeynet padded cell system how do they differ from one another?

A padded cell is a honey poi that has been protected so that that it cannot be easily compromised. In other words, a padded cell is a hardened honey pot. In addition to attracting attackers with tempting data, a padded cell operates in tandem with a traditional IDS.