_________ techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious. ?

Fill in the blank(s) with the appropriate word(s).

Rule-based

Computer Science & Information Technology

You might also like to view...

Can Dreamweaver open an RTF or other non-web file types?

What will be an ideal response?

Computer Science & Information Technology

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?

A. chosen-ciphertext B. chosen-plaintext C. known plaintext D. ciphertext-only

Computer Science & Information Technology