Question: I. Comparative effectiveness can be achieved by the following: Thresholds Blacklists Whitelists Alert Settings II. Direct students to the point that

I. Comparative effectiveness can be achieved by the following:
• Thresholds
• Blacklists
• Whitelists
• Alert Settings
II. Direct students to the point that once implemented, IDPSs are evaluated using two dominant metrics: administrators evaluate the number of attacks detected in a known collection of probes and examine the level of use at which the IDPSs fail.
III. Explain that since developing this collection can be tedious, most IDPS vendors provide testing mechanisms that verify that their systems are performing as expected. Some of these testing processes will enable the administrator to do the following:
• Record and retransmit packets from a real virus or worm scan.
• Record and retransmit packets from a real virus or worm scan with incomplete TCP/IP session connections (missing SYN packets).
• Conduct a real virus or worm attack against a hardened or sacrificial system.

Step by Step Solution

3.47 Rating (154 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Solution and Explanation I 1 Thresholds By setting certain thresholds you can ensure that the IDPS o... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Principles Of Information Security Questions!