FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Checks and identifies threats based on normal expected network behaviors.
A
Honey pot
B
Distributed intrusion detection system (DIDS)
C
Anomaly based
D
Signature based
Explanation: 

Detailed explanation-1: -There are three main classes of anomaly detection techniques: unsupervised, semi-supervised, and supervised.

Detailed explanation-2: -Anomaly-based IDSes typically work by taking a baseline of the normal traffic and activity taking place on the network. They can measure the present state of traffic on the network against this baseline in order to detect patterns that are not present in the traffic normally.

Detailed explanation-3: -An anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous.

Detailed explanation-4: -Signature-based and anomaly-based detections are the two main methods of identifying and alerting on threats. While signature-based detection is used for threats we know, anomaly-based detection is used for changes in behavior.

There is 1 question to complete.