6. We looked at the components of Intrusion Detection Systems in terms of Sensors and Analyzers.
A. Please suggest a plausible location in a network to place a sensor. Use this location to answer the next two questions:
i) Please say what type of information that sensor could collect
ii) Please say what the Analyzer package should look for in that information while trying to detect attacks.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here