what technology should it implement?

If a company needs to ensure it detects all known attacks, what technology should it implement?

If a company needs to ensure it detects all known attacks, what technology should it implement?

A.
Behavioral IDS

B.
Signature-based IDS

C.
Rule-based IDS

D.
Expert IDS

Explanation:
Knowledge is accumulated by the IDS vendors about specific attacks and
how they are carried out. Models of how the attacks are carried out are developed
and called signatures. Each identified attack has a signature, which is used to
detect an attack in progress or determine if one has occurred within the network.
Any action that is not recognized as an attack is considered acceptable.
Knowledge-based IDS, also known as signature-based, can detect only known attacks.
Anomaly-based IDS can detect new attacks that have no signatures yet.



Leave a Reply 0

Your email address will not be published. Required fields are marked *