Author: | Hemang Doshi | ISBN: | 9781370493869 |
Publisher: | Hemang Doshi | Publication: | December 29, 2016 |
Imprint: | Smashwords Edition | Language: | English |
Author: | Hemang Doshi |
ISBN: | 9781370493869 |
Publisher: | Hemang Doshi |
Publication: | December 29, 2016 |
Imprint: | Smashwords Edition |
Language: | English |
Point to remember for CISA Exam:
(1)In any given scenario, out of all three IDS (i.e. (i) signature (ii) statistics and (iii) neural network), neural network creates its own database.
(2)Of all three IDS (i.e. (i) signature (ii) statistics and (iii) neural network), neural network is more effective in detecting fraud
(3)In any given scenario, out of all three IDS (i.e. (i) signature (ii) statistics and (iii) neural network), statistical based IDS generates most false positives (false alarms).
(4)In any given scenario, out of four components of IDS (i.e. (i) sensor (ii) analyzer (iii) admin console and (iv) user interface) sensor collects the data and send to analyzer for data analysis.
(5)In any given scenario, most important concern of IDS implementation is that attacks not identified/detected by IDS.
Point to remember for CISA Exam:
(1)In any given scenario, out of all three IDS (i.e. (i) signature (ii) statistics and (iii) neural network), neural network creates its own database.
(2)Of all three IDS (i.e. (i) signature (ii) statistics and (iii) neural network), neural network is more effective in detecting fraud
(3)In any given scenario, out of all three IDS (i.e. (i) signature (ii) statistics and (iii) neural network), statistical based IDS generates most false positives (false alarms).
(4)In any given scenario, out of four components of IDS (i.e. (i) sensor (ii) analyzer (iii) admin console and (iv) user interface) sensor collects the data and send to analyzer for data analysis.
(5)In any given scenario, most important concern of IDS implementation is that attacks not identified/detected by IDS.