Identification Technologies Flashcards
1
Q
Signature Based
A
Looks for a perfect signature match.
2
Q
Anomaly Based
A
Builds a baseline of what’s normal. Drops traffic what doesn’t match ‘normal’ traffic.
3
Q
Behaviour Nased
A
Looks for behaviours. If a user deletes a file or changes a file, if the IPS is configured to see that, it will block it based on Behaviours.
4
Q
Heuristics
A
Instead of using a specific set of signatures, IPS can be configured to detect a set of characteristics what might define an attack.
5
Q
False Positives
A
A report that isn’t true. A false alarm.
6
Q
False Negative
A
A report missed identifying something. (You didn’t receive notification).