COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Zone based
|
|
Host & Network based
|
|
Network & Zone based
|
|
Level based
|
Detailed explanation-1: -IDS can be classified by where detection takes place (network or host) or the detection method that is employed (signature or anomaly-based).
Detailed explanation-2: -What are the different ways to classify an IDS? a) anomaly detection. b) signature based misuse. c) stack based. d) all of the mentioned.
Detailed explanation-3: -Host-Based IDS (HIDS): A host-based IDS is deployed on a particular endpoint and designed to protect it against internal and external threats. Network-Based IDS (NIDS): A network-based IDS solution is designed to monitor an entire protected network.
Detailed explanation-4: -Asset Discovery & Inventory. Vulnerability Assessment. Network & Cloud IDS. Behavioral Monitoring. Incident Response. SIEM Event Correlation and Log Management.
Detailed explanation-5: -Signature-Based Intrusion Detection. Signature-Based Intrusion Detection Systems (SIDS) aim to identify patterns and match them with known signs of intrusions. Anomaly-Based Intrusion Detection. Hybrid Intrusion Detection.