List five strengths of IDPSs.
What will be an ideal response?
IDPSs perform the following functions well:
· Monitoring and analysis of system events and user behaviors
· Testing the security states of system configurations
· Baselining the security state of a system, then tracking any changes to that baseline
· Recognizing patterns of system events that correspond to known attacks
· Recognizing patterns of activity that statistically vary from normal activity
· Managing operating system audit and logging mechanisms and the data they generate
· Alerting appropriate staff by appropriate means when attacks are detected
· Measuring enforcement of security policies encoded in the analysis engine
· Providing default information security policies
· Allowing non-security experts to perform important security monitoring functions
You might also like to view...
A network where every user is physically connected to every other user is
a. a star network b. a mesh network c. a circuit-switched network d. a packet-switched network
Which of the following letters would be an example of a compound path?
A. E B. G C. P D. U