COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following statements defines an Intrusion Detection System?
A
Computer device which forwards data packets from one network to another
B
software designed to protect computers from viruses
C
device which monitors network activities for malicious attacks & produces reports to a management station
D
network controller which connects network devices & allows effective communication between these devices
Explanation: 

Detailed explanation-1: -Host-Based IDS (HIDS): A host-based IDS is deployed on a particular endpoint and designed to protect it against internal and external threats. Such an IDS may have the ability to monitor network traffic to and from the machine, observe running processes, and inspect the system’s logs.

Detailed explanation-2: -An IDS designed to monitor networks is known as a Network Intrusion Detection System (NIDS); an IDS monitoring a single host is called a Host Intrusion Detection System (HIDS).

Detailed explanation-3: -Answer. Snort is referred to as a packet sniffer that monitors network traffic, scrutinizing each packet closely to detect a dangerous payload or suspicious anomalies.

There is 1 question to complete.