InterviewSolution
| 1. |
Explain Host Based (hids)? |
|
Answer» Host Based (HIDS) : Often referred to as HIDS, host based intrusion detection attempts to identify unauthorized, illicit, and anomalous behavior on a specific DEVICE. HIDS generally INVOLVES an agent installed on each system, monitoring and alerting on local OS and application activity. The installed agent uses a combination of signatures, rules, and heuristics to identify unauthorized activity. The ROLE of a host IDS is passive, only gathering, identifying, logging, and alerting. Examples of HIDS:
Host Based (HIDS) : Often referred to as HIDS, host based intrusion detection attempts to identify unauthorized, illicit, and anomalous behavior on a specific device. HIDS generally involves an agent installed on each system, monitoring and alerting on local OS and application activity. The installed agent uses a combination of signatures, rules, and heuristics to identify unauthorized activity. The role of a host IDS is passive, only gathering, identifying, logging, and alerting. Examples of HIDS: |
|