CSE3502 Study Guide - Final Guide: Intrusion Detection System, Simple Mail Transfer Protocol, Hypertext Transfer Protocol

20 views7 pages

Document Summary

Internet: authorized users of systems who misuse their privileges or attempt to gain additional privileges for which they are not authorized. Intrusion detection is the process of monitoring the events occurring in a computer system or network and analysing them for signs of possible intrusions. Intrusion detection system is software that automates the intrusion detection process. The primary responsibility of an ids is to detect unwanted and malicious activities. Intrusion prevention system is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents. Intrusion detection systems can be grouped into the following categories: host-based intrusion detection system, host-based idss are designed to monitor, detect and respond to activity and attacks on a given host. Netbeui and xns, are vulnerable to attack and require additional ways to detect malicious events: frequently, intrusion detection systems have difficulty working with encrypted information and traffic from virtual private networks.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers

Related Documents

Related Questions