Answer:
The database models depend very much on what will be the use in the business logic of the company will have directly with the database, primarily implying whether or not to use a relational or non-relational database.
Explanation:
In relational databases there is something called normalization, which after the construction of a data model allows me to optimize in a greater way the way in which I will make the queries within this database, that is a fundamental aspect, since one of the fundamental aspects today about the business logic of companies with databases is the capacity to respond when waiting for a query and if it is delayed a lot there will be inconvenience with the expected result.
Currently there are different examples of in which scenario what kind of database is better, distributed, centralized databases, clusters is.. And it is where you need to be very clear about what is my business and what type of database is adapted more to be.
I hope I could help you.
The shadow cast by the earth is quite a bit larger than the moon
Answer:
a. NIDS focuses more on analyzing incoming traffic, while an HIDS monitors valuable OS files
Explanation:
Intrusion detection system is used in analyzing, detecting, and raising alarm on suspicious network activities used by hackers to access unauthorized sites. Network intrusion detection system is meant to work in real-time, so as to analyze incoming traffic. Packets moving across the network are evaluated for threats.
Host intrusion detection system work within the operating system of the device to evaluate the history of system files that could contain threats, or unusual file permission changes, and then raise an alarm.