Unit 3 - mine

Subdecks (8)

Cards (164)

  • Anomaly-Based IDS Pros

    Can detect unknown or 0-day attacks, Can adapt to changing network environments, Can detect insider threats
  • Anomaly-Based IDS Cons

    May produce false positives, May require extensive tuning and fine-tuning, May be more resource-intensive
  • Signature-Based IDS Pros

    Highly effective against known attacks, Can be easily updated with new signatures, Provides clear and specific alerts
  • Signature-Based IDS Cons

    May not detect unknown or 0-day attacks, Can be overwhelmed by large volumes of traffic, May not adapt well to changing network environments
  • Company with complex network environment
    Best suited for: Anomaly-Based IDS
  • Company with previous attacks
    Best suited for: Signature-Based IDS
  • Company with limited resources
    Best suited for: Signature-Based IDS
  • Company willing to invest in IDS tuning

    Best suited for: Anomaly-Based IDS
  • Vulnerability Testing
    A type of penetration testing that aims to identify potential weaknesses or vulnerabilities in a system, application, or network.
  • Fuzzing
    A type of vulnerability testing that involves sending random or modified input data to a system or application to trick it into revealing bugs or vulnerabilities.
  • System Management
    The day-to-day administration and maintenance of a system, including tasks such as monitoring system performance, updating software, and troubleshooting issues.
  • Vulnerability
    A weakness or flaw in a system, application, or network that could be exploited by an attacker.
  • Pentesting
    A simulated cyber attack against a system, network, or application to assess its security and identify vulnerabilities.
  • Passcode
    A sequence of characters, usually numerical, used to unlock a phone or access a specific application.
  • Fingerprint Recognition
    A biometric authentication method that uses your phone's camera to capture and analyze the unique patterns on your fingertips.
  • Face Recognition
    A biometric authentication method that uses your phone's camera to compare the photo of your face to the one stored on record.
  • Two-Factor Authentication (2FA)

    A security process that requires not one, but two forms of verification to access an account or application.