_________ identification takes a very different approach to intrusion detection. The key feature of such systems is the use of rules for identifying known penetration or penetrations that would exploit known weaknesses
Typically the rules used in these systems are specific to the machine and operating system.
What will be an ideal response?
Rule-based penetration
Business