Difference between passive and active intrusion detection

Assignment Help Operating System
Reference no: EM1379606

Question: Discuss the difference between passive and active intrusion detection? Passive intrusion detection will detect and record intrusion attempts, but it does not take action. The active intrusion detection will detect the attacks and send an alert to the network administrator or take action to block the attack. With that said, why would anyone waste their money on even getting the passive intrusion detection if it only records the attacks and takes no action. I really don't understand. What are the pros and cons of passive and active intrusion detection? What are decoys and how are they used in a network?

Reference no: EM1379606

Questions Cloud

Question about network design : Sterling Corporation wishes you to create a network infrastructure for them. They have 5-divisions with many hundred users at each division across the US.
Maintaining network configuration : In a Windows 2003 server network discuss various devices such as: repeaters, routers and gateways. Detemrine the functions for those devices? At which layer of the OSI model do those devices operate?
Identifying wireless network architectures : Some of the local hospital's administrators are questioning privacy of patients' data with wireless transmission. Discuss and determine the merits of their concerns.
Networking based question : Determine some of the factors other then the network itself that can cause the network to seem slow?
Difference between passive and active intrusion detection : Discuss the difference between passive and active intrusion detection? Passive intrusion detection will detect and record intrusion attempts, but it does not take action.
Efficiency and effectiveness of project communications : Determine what types of data are shared through documents and what types are shared through meetings? Discuss how has social networking affected the efficiency and effectiveness of project communications?
Question about about telecommunications : Think about a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk in each end office and the intermediate switch.
Solving networking question : Your corporation has a network that contains many NetWare 4.11 servers and uses IPX as the routing protocol. Each of network sections has at least one NetWare server on it.
Question about internet usage : Do you think that an workers internet usage at a corporation should be audited and governed through usage policy?

Reviews

Write a Review

Operating System Questions & Answers

  Use of the ipc facilities provided by unix

The purpose of this program is to change such that it makes use of the IPC facilities provided by UNIX.

  Determine transmission line speed

Imagine you are creating an application at work that transmits data record to another building within the similar city. The data records are 500 bytes in length,

  Determine the rang of usable ip addresses

Determine the rang of usable IP addresses for the following IP subnet also determine the bradcast address for the subnet?

  Operating system maps user-level threads to kernel

Suppose an operating system maps user-level threads to the kernel using the many-to-many model and the mapping is done through LWPs.

  Question about information security

Discover an article about information security. Give an introduction, and select various aspects of the article or Web site.

  Difference between an exclusive lock and a shared lock

Describe the difference between an exclusive lock and a shared lock. Define deadlock and how can it be avoided? How can it be resolved once it occurs?

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Stateful inspection packet filtering routers

Name two benefits of Stateful Inspection Packet Filtering Routers. Name two benefits that firewalls add to a network

  Individual operating systems

Discuss and explain the statement: "Global communication has developed to such a degree that the true operating system is the net itself, where the individual operating systems are just its nodes".

  Explaining the type of firewall

Can you think of conditions that call for multiple firewalls on the similar network or similar network segment? Discuss why might you firewall off two or more connections into a subnetwork?

  Write bash shell script for number files in directories

Write a bash shell script filestatic. The script should examine the number files in directories given as arguments (parameters) to this script.

  Disk scheduling algorithm

Simulation of Elevator and Shortest Seek Time First

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd