1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klio [65]
4 years ago
11

A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify a

ttempted infiltration, and raise further alarms to warn security personnel is known as a(n):
Computers and Technology
1 answer:
yarga [219]4 years ago
7 0

Answer:

Intrusion detection systems

Explanation:

Intrusion detection systems (IDS) are systems designed to monitor network use for any potential hacking or suspicious activity and then take measures to issue alerts upon discovery of such activity. IDS are applications that help secure a network or system from policy breaching or other activities that may be harmful to the network. There are four major types of IDS and they are: Perimeter Intrusion Detection System (PIDS) , Network intrusion detection system (NIDS), VM based Intrusion Detection System (VMIDS), and Host-based intrusion detection system (HIDS) .

You might be interested in
What role do computer play in law and order​
kirza4 [7]

Computers on Law & Order tracks computers and computer use through all 456 episodes of the American crime drama Law & Order.

Explanation:

5 0
3 years ago
HI brainly friends....<br> Pease thanks my answers I will also thank your answers
Art [367]

Answer:

oky will do. Have a good day

6 0
3 years ago
Computer operates nearly 100% accurately but why is the phrase'garbage in garbage out'(GIGO) associated with their use?Describe
k0ka [10]

Answer:

A program gives inaccurate results due to inaccurate data provided because a computer will always attempt to process data given to it. Said another way, the output quality of a system usually can't be any better than than the quality of inputs.

Explanation:

Techopedia Explains Garbage In, Garbage Out (GIGO)

<h3>Mark me a brainlist</h3>
8 0
3 years ago
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
Explain one rule the company must follow when using cookies on its website.
ololo11 [35]

Explanation:

Work out what cookies your site sets, and what they are used for, with a cookie audit.

Tell your visitors how you use cookies.

Obtain their consent, such as by using Optanon, and give them some control.

7 0
3 years ago
Other questions:
  • ________ and wpa are wireless security protocols which use encryption to secure wi_fi networks.
    12·1 answer
  • What is the difference between operating systems and application software?
    6·2 answers
  • Can you answer your own question on brainly?
    12·2 answers
  • Design and implement a java program (name it CheckPoint) that prompts the user to enter the x-coordinate and y-coordinate of a p
    6·1 answer
  • In cell e9, enter a formula that calculates the session fee for a member. members receive a member discount off the non-member s
    9·1 answer
  • To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the security
    13·1 answer
  • Problem statement: Using loop, write a program that will ask the user to enter a character for left or right. Then, the user wil
    13·1 answer
  • do you think that some people have difficulty talking to others face to face because of how prevalent texting is today
    15·2 answers
  • Why do electronic devices gather so much dust? Thanks
    8·1 answer
  • What does c++ programming mean?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!