Discuss the process of IDPS signature evaluation.
What will be an ideal response?
You do not monitor and evaluate network traffic to create a large quantity of data to analyze. Instead, you want to gather evidence that indicates whether your IDPS signatures are working well or need to be updated. A variety of IDPS vendors are available, each with its own set of signatures for suspicious events. How do you evaluate signatures for each one? Various attempts have been made to standardize the evaluation and comparison of signature sets, but none have been adopted widely enough to be effective.
Therefore, the process of updating IDPS signatures varies depending on the vendor. One should check the vendor's Web site for complete instructions and visit it often to download new signatures.
You might also like to view...
?You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of ________.
A. ?cyberterrorism B. ?ransomware C. identity theft D. cyber espionage
Describe the change control process for a modern software development project.
What will be an ideal response?