One form of IDS starts operation by generating an alert for every action. Over time, the administrator adjusts the setting of the IDS so that common, benign activities do not generate alarms. What are the advantages and disadvantages of this design for an IDS?

What will be an ideal response?


Pro:
Adjusts
to
characteristics
of
monitored
network.
Con:
The
tuning
process
can
be
painful
and
time
consuming.

Computer Science & Information Technology

You might also like to view...

Given this information, what physical and logical topologies would you recommend for New Century? Explain your answer.

What will be an ideal response?

Computer Science & Information Technology

The ________ property is used with the object element to define values for different attributes such as the filename of the object's source

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is not a Trojan?

a. Eblaster b. Amitis c. Beast d. HijackThis

Computer Science & Information Technology

What is the value of aList after the following code is executed? aList = [1, 2, 3]aList.remove(2)

A. [1, 2] B. [1, 3] C. [3] D. [1]

Computer Science & Information Technology