Unit 3 - mine

    Subdecks (8)

    Cards (164)

    • Anomaly-Based IDS Pros

      Can detect unknown or 0-day attacks, Can adapt to changing network environments, Can detect insider threats
    • Anomaly-Based IDS Cons

      May produce false positives, May require extensive tuning and fine-tuning, May be more resource-intensive
    • Signature-Based IDS Pros

      Highly effective against known attacks, Can be easily updated with new signatures, Provides clear and specific alerts
    • Signature-Based IDS Cons

      May not detect unknown or 0-day attacks, Can be overwhelmed by large volumes of traffic, May not adapt well to changing network environments
    • Company with complex network environment
      Best suited for: Anomaly-Based IDS
    • Company with previous attacks
      Best suited for: Signature-Based IDS
    • Company with limited resources
      Best suited for: Signature-Based IDS
    • Company willing to invest in IDS tuning

      Best suited for: Anomaly-Based IDS
    • Vulnerability Testing
      A type of penetration testing that aims to identify potential weaknesses or vulnerabilities in a system, application, or network.
    • Fuzzing
      A type of vulnerability testing that involves sending random or modified input data to a system or application to trick it into revealing bugs or vulnerabilities.
    • System Management
      The day-to-day administration and maintenance of a system, including tasks such as monitoring system performance, updating software, and troubleshooting issues.
    • Vulnerability
      A weakness or flaw in a system, application, or network that could be exploited by an attacker.
    • Pentesting
      A simulated cyber attack against a system, network, or application to assess its security and identify vulnerabilities.
    • Passcode
      A sequence of characters, usually numerical, used to unlock a phone or access a specific application.
    • Fingerprint Recognition
      A biometric authentication method that uses your phone's camera to capture and analyze the unique patterns on your fingertips.
    • Face Recognition
      A biometric authentication method that uses your phone's camera to compare the photo of your face to the one stored on record.
    • Two-Factor Authentication (2FA)

      A security process that requires not one, but two forms of verification to access an account or application.