One form of IDS starts operation by generating an alert for every action. Over time, the administrator adjusts the setting of the IDS so that common, benign activities do not generate alarms. What are the advantages and disadvantages of this design for an IDS?
What will be an ideal response?
Pro:
Adjusts
to
characteristics
of
monitored
network.
Con:
The
tuning
process
can
be
painful
and
time
consuming.
Computer Science & Information Technology
You might also like to view...
Given this information, what physical and logical topologies would you recommend for New Century? Explain your answer.
What will be an ideal response?
Computer Science & Information Technology
The ________ property is used with the object element to define values for different attributes such as the filename of the object's source
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following is not a Trojan?
a. Eblaster b. Amitis c. Beast d. HijackThis
Computer Science & Information Technology
What is the value of aList after the following code is executed? aList = [1, 2, 3]aList.remove(2)
A. [1, 2] B. [1, 3] C. [3] D. [1]
Computer Science & Information Technology