Difference between passive and active intrusion detection

Assignment Help Operating System
Reference no: EM1379606

Question: Discuss the difference between passive and active intrusion detection? Passive intrusion detection will detect and record intrusion attempts, but it does not take action. The active intrusion detection will detect the attacks and send an alert to the network administrator or take action to block the attack. With that said, why would anyone waste their money on even getting the passive intrusion detection if it only records the attacks and takes no action. I really don't understand. What are the pros and cons of passive and active intrusion detection? What are decoys and how are they used in a network?

Reference no: EM1379606

Questions Cloud

Question about network design : Sterling Corporation wishes you to create a network infrastructure for them. They have 5-divisions with many hundred users at each division across the US.
Maintaining network configuration : In a Windows 2003 server network discuss various devices such as: repeaters, routers and gateways. Detemrine the functions for those devices? At which layer of the OSI model do those devices operate?
Identifying wireless network architectures : Some of the local hospital's administrators are questioning privacy of patients' data with wireless transmission. Discuss and determine the merits of their concerns.
Networking based question : Determine some of the factors other then the network itself that can cause the network to seem slow?
Difference between passive and active intrusion detection : Discuss the difference between passive and active intrusion detection? Passive intrusion detection will detect and record intrusion attempts, but it does not take action.
Efficiency and effectiveness of project communications : Determine what types of data are shared through documents and what types are shared through meetings? Discuss how has social networking affected the efficiency and effectiveness of project communications?
Question about about telecommunications : Think about a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk in each end office and the intermediate switch.
Solving networking question : Your corporation has a network that contains many NetWare 4.11 servers and uses IPX as the routing protocol. Each of network sections has at least one NetWare server on it.
Question about internet usage : Do you think that an workers internet usage at a corporation should be audited and governed through usage policy?

Reviews

Write a Review

Operating System Questions & Answers

  Determining race condition in protocol

What is race condition in this protocol?debitcard machine determine current value of card in dollars which is stored in value x.

  Security monitoring activities in it

Discuss and explain the security monitoring activities that should be conducted in an company with both internal IT and e commerce applications.

  Explain the concepts of consumable and reusable resources

Explain the concepts of consumable and reusable resources

  Differences in windows, mac os, unix, and linux os

Discuss the fundamental differences in Windows, Mac OS, UNIX, and Linux operating systems for personal computers? Determine the unique characteristics do mainframe operating systems have?

  Backup, restore and roll forward recovery in apache derby

The reason of this three page paper is to discuss, Backup, Restore, and Roll forward Recovery in Apache Derby. Backup and restore capabilities are key to ensuring data recoverability for any database management system.

  Question about security policy

ABC Corporation is a small but growing manufacturing corporation with revenues of approximately $25 million. Until now, the corporation has had a single headquarters and production facility in a Midwestern city,

  Write the start-up steps in windows nt

Write the start-up steps in Windows NT. Provide estimate for the capital investment needed in computer forensics for a 2,000,000 population.

  Implementation of the electronic medical record

Explain how the effectiveness the implementation of the electronic medical record change will be determined once implemented.

  Deadlock avoidance

i. Deadlock avoidance ii. Deadlock prevention and  iii. Deadlock detection

  Determine the average seek time of traversed disk

Traversed Disk receives request to access random sector on random track. Suppose head starts at track 0. Determine the average seek time?

  Importance of maintaining security on a lan

Discuss what roles do firewalls and proxy servers play in network security? Determine the importance of maintaining security on a LAN?

  Explaining first-in-first-out scheduling

Qqueue for service (if the server process is busy servicing another request). Requests in queue are served according to the scheduling policy in use: First-In-First-Out (FIFO) scheduling.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd