What is the advantage in encrypting the communication between the agent and the monitor in an Intrusion Detection System?
StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft’s /GS option use _____ defense against buffer overflow attacks.