Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Security Systems Ch7 Matching
Passive mode-
use same connection methods as network-based IDPS
Intrusion prevention system (IPS)
– can detect an intrusion, and also prevent that intrusion from successfully attacking the organization by means of an active response
Protocol stack verification-
a process in which a network-based intrusion detection prevention system looks for invalid data packets
Trap and trace
- an extension of the attractant technologies discussed in the previous section, are growing in popularity
Enticement-
process of attracting attention to a system by placing tantalizing information in key locations
Smart card
- contains a computer chip that can verify and validate a number of pieces of information instead of just a PIN
Host-based IDPS
- resides on a particular computer or server, known as the host, and monitors activity only on that system
False reject rate-
the percentage of identification instances in which authorized users are denied access a result of a failure in the biometric device
Stateful protocol analysis (SPA)
process of comparing predetermined profiles of generally accepted definitions of benign activity for each protocol state against observed events to identify deviations
Footprinting
- the organized research of the Internet addresses owned or controlled by a target organization
0:00

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: chels2407
Popular Computers sets