InterviewSolution
| 1. |
Besides Default Rule Sets, What Activities Are Actively Monitored By Your Ids? |
|
Answer» IDSs come with default rule sets to look for common attacks. These rule sets must also be customized and augmented to look for traffic and activities specific to your organization’s security policy. For example, if your organization’s security policy PROHIBITS peer-to-peer communications, then a rule should be CREATED to watch for that type of activity. In addition, outbound traffic should be WATCHED for POTENTIAL TROJANS and backdoors. IDSs come with default rule sets to look for common attacks. These rule sets must also be customized and augmented to look for traffic and activities specific to your organization’s security policy. For example, if your organization’s security policy prohibits peer-to-peer communications, then a rule should be created to watch for that type of activity. In addition, outbound traffic should be watched for potential Trojans and backdoors. |
|