1.

What Are Intrusion Detection Systems(ids)?

Answer»

IDSS work LIKE BURGLAR alarms

IDSs require complex configurations to provide the level of detection and response desired

An IDS operates as either network-based, when the technology is focused on protecting network information assets, or host-based, when the technology is focused on protecting server or host information assets

IDSs use one of TWO detection methods, signature-based or STATISTICAL anomaly-based.

IDSs work like burglar alarms

IDSs require complex configurations to provide the level of detection and response desired

An IDS operates as either network-based, when the technology is focused on protecting network information assets, or host-based, when the technology is focused on protecting server or host information assets

IDSs use one of two detection methods, signature-based or statistical anomaly-based.



Discussion

No Comment Found