List five strengths of IDPSs.

What will be an ideal response?

IDPSs perform the following functions well:
·      Monitoring and analysis of system events and user behaviors
·      Testing the security states of system configurations
·      Baselining the security state of a system, then tracking any changes to that baseline
·      Recognizing patterns of system events that correspond to known attacks
·      Recognizing patterns of activity that statistically vary from normal activity
·      Managing operating system audit and logging mechanisms and the data they generate
·      Alerting appropriate staff by appropriate means when attacks are detected
·      Measuring enforcement of security policies encoded in the analysis engine
·      Providing default information security policies
·      Allowing non-security experts to perform important security monitoring functions

Computer Science & Information Technology

You might also like to view...

A network where every user is physically connected to every other user is

a. a star network b. a mesh network c. a circuit-switched network d. a packet-switched network

Computer Science & Information Technology

Which of the following letters would be an example of a compound path?

A. E B. G C. P D. U

Computer Science & Information Technology