List five strengths of IDPSs.

What will be an ideal response?


IDPSs perform the following functions well:
·      Monitoring and analysis of system events and user behaviors
·      Testing the security states of system configurations
·      Baselining the security state of a system, then tracking any changes to that baseline
·      Recognizing patterns of system events that correspond to known attacks
·      Recognizing patterns of activity that statistically vary from normal activity
·      Managing operating system audit and logging mechanisms and the data they generate
·      Alerting appropriate staff by appropriate means when attacks are detected
·      Measuring enforcement of security policies encoded in the analysis engine
·      Providing default information security policies
·      Allowing non-security experts to perform important security monitoring functions

Computer Science & Information Technology

You might also like to view...

The protection of the information that might be derived from observation of traffic flows is _________ .

A) connectionless confidentiality B) connection confidentiality C) traffic- flow confidentiality D) selective- field confidentiality

Computer Science & Information Technology

When printing a form that uses tab control for printing, the screens displaying the data are copied into WordPad and then printed

Indicate whether the statement is true or false

Computer Science & Information Technology

What happens if you click the Gridlines check box to deselect it?

A. The gridlines rotate B. The gridlines become dim C. The gridlines become bold D. The gridlines disappear

Computer Science & Information Technology

A field whose data type is ____ can store an OLE object, which is an object linked to or embedded in the table.

A. Picture B. Image C. OLE Object D. Bitmap

Computer Science & Information Technology