1. List and briefly define three classes of intruders.
2. Give examples of intrusion.
3. What are the two ways used for protecting a password file?
4. Explain how statistical anomaly detection and rule-based intrusion detection are used to detect different types of intruders.
5. Give examples of metrics that are useful for profile-based intrusion detection.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here