Computer Security:Principles and Practice, 3rdEditionChapter 8csdChapter 8 – Intrusion Detection1. An intruder can also be referred to as a hacker or cracker.
Get answer to your question and much more
2. Activists are either individuals or members of an organized crime
Get answer to your question and much more
group with a goal of financial reward.3. Running a packet sniffer on a workstation to capture usernames and
Get answer to your question and much more
passwords is an example of intrusion.4. Those who hack into computers do so for the thrill of it or for status.
Get answer to your question and much more
5. Intruders typically use steps from a common attack methodology.
Get answer to your question and much more
6. The IDS component responsible for collecting data is the user interface.
Get answer to your question and much more
7. Intrusion detection is based on the assumption that the behavior of the
Get answer to your question and much more
intruder differs from that of a legitimate user in ways that can be quantified.8. The primary purpose of an IDS is to detect intrusions, log suspicious
Get answer to your question and much more
events, and send alerts.9. Signature-based approaches attempt to define normal, or expected,
Get answer to your question and much more
behavior, whereas anomaly approaches attempt to define proper behavior.10. Anomaly detection is effective against misfeasors.
Get answer to your question and much more
11. To be of practical use an IDS should detect a substantial percentage of
Get answer to your question and much more
intrusions while keeping the false alarm rate at an acceptable level.12. An inline sensor monitors a copy of network traffic; the actual traffic
Get answer to your question and much more
does not pass through the device.13. A common location for a NIDS sensor is just inside the external
Get answer to your question and much more
firewall.14. Network-based intrusion detection makes use of signature detection
Get answer to your question and much more