Midterm quiz 2 Flashcards
(10 cards)
It is a value that sets the limit between normal and abnormal behaviour. it specifies a maximum acceptable leve
Threshold
It resides on a computer or appliance connected to a segment of an organization’s network and monitors network traffic.trusion detection/prevention system.
NIDS
Usually consist of honeypot or padded cell and alarm, The system notifies the admin of their presence.
Trap
Activities finalize the restoration of operation to a normal state to identify and seek and to identify the source of methods of intrusion.
IDPS Control Strategy
It is a percentage of identification instances in which unauthorized users are allowed access to system or areas because of a failure in biometric device.
False Accept Rate (FAR)
Activities that gather information about organization and its network activities and assets.
Footprinting
A decoy system designed to lure potential attackers away from critical system, it also known as decoys, lure, and flytraps.
Honeypots
Scan networks for highly detailed information, it initiates traffic on the network to determine security holes
Vulnerability Scanner
Alarms events that are accurate and noteworthy but that do not pose significant threats to information security.
Noise
Actions taken to fix security breaches.
Intrusion Correction