Chapter 4 Quiz


Explain the 3 types of models a good Intrusion Detection System (IDS) uses to detect unauthorized intrusions?

Quiz Solution

Discussion Questions

  1. What protection would someone have against a ddos attack from a large botnet?
  2. The reading says that hackers can exploit the firewall applications themselves, how could this be done? Do firewalls not protect themselves?
  3. It seems like there are no ends to possible expoloits and backdoors to enter a system. How can someone how to stay ahead of people who are dedicating all of their time to breaking into said system?
  4. What sorts of data correlation tactics are difficult for computers? How can we tell what's hard for us versus what's hard for them
  5. What are the ethical implications of low hanging fruit?
Topic revision: r4 - 2014-04-02 - JimSkon
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback