Completion requirements
The counterpart to network intrusion detection systems are host-based intrusion detection systems (HIDS). Pay attention to the description of a HIDS, the purpose of a HIDS, and what type of attacks HIDS can detect. What are the types of HIDS and what are they based on? What are three categories of measurement that can implicate an instrusion?
Source: Steven Gordon, https://www.youtube.com/watch?v=6sfiGsFjluY This work is licensed under a Creative Commons Attribution 3.0 License.
Last modified: Friday, 26 July 2024, 3:05 PM