– can detect an intrusion, and also prevent that intrusion from successfully attacking the organization by means of an active response
Protocol stack verification-
a process in which a network-based intrusion detection prevention system looks for invalid data packets
Trap and trace
- an extension of the attractant technologies discussed in the previous section, are growing in popularity
Enticement-
process of attracting attention to a system by placing tantalizing information in key locations
Smart card
- contains a computer chip that can verify and validate a number of pieces of information instead of just a PIN
Host-based IDPS
- resides on a particular computer or server, known as the host, and monitors activity only on that system
False reject rate-
the percentage of identification instances in which authorized users are denied access a result of a failure in the biometric device
Stateful protocol analysis (SPA)
process of comparing predetermined profiles of generally accepted definitions of benign activity for each protocol state against observed events to identify deviations
Footprinting
- the organized research of the Internet addresses owned or controlled by a target organization