Академический Документы
Профессиональный Документы
Культура Документы
Ethical hacker
Report on
security flaws
General vulnerabilities
Application-specific vulnerabilities
Tools for different scan types
General scan
Man-in-the-middle scan
Port scan
Password scan
Host-based Application-based
Network-based
Signature-based
Activity matches known attacks
Anomaly-based
Compares changes to pre-set parameters
Software-based Hardware-based
Composite or
network-based
Who verifies
incident
Who is notified
Who determines
response
1. What type of intrusion detection software are you familiar with, and
how have you used it to detect attacks?