week 11 and week 12
11.1 List and briefly ascertain three classes of intruders.
11.2 What are two accepted techniques acclimated to assure a countersign file?
11.3 What are three allowances that can be provided by an advance apprehension system?
11.4 What is the aberration amid statistical aberration apprehension and rule-based advance detection?
11.5 What metrics are advantageous for profile-based advance detection?
11.6 What is the aberration amid rule-based aberration apprehension and rule-based assimilation identification?
11.7 What is a honeypot?
11.8 What is a alkali in the ambience of UNIX countersign management?
11.9 List and briefly ascertain four techniques acclimated to abstain guessable passwords.
12.1 List three architecture goals for a firewall.
12.2 List four techniques acclimated by firewalls to ascendancy admission and accomplish a aegis policy.
12.3 What advice is acclimated by a archetypal packet clarification firewall?
12.4 What are some weaknesses of a packet clarification firewall?
12.5 What is the aberration amid a packet clarification firewall and a stateful analysis firewall?
12.6 What is an application-level gateway?
12.7 What is a circuit-level gateway?
12.9 What are the accepted characteristics of a breastwork host?
12.10 Why is it advantageous to accept host-based firewalls?
12.11 What is a DMZ arrangement and what types of systems would you apprehend to acquisition on such networks?
12.12 What is the aberration amid an centralized and an alien firewall?
Order a unique copy of this paper