CISA Exam-Testing Concept-IDS & IPS (Domain 5)

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 ก.ย. 2024
  • Point to remember for CISA Exam:
    (1)In any given scenario, out of all three IDS (i.e. (i) signature (ii) statistics and (iii) neural network), neural network creates its own database.
    (2)Of all three IDS (i.e. (i) signature (ii) statistics and (iii) neural network), neural network is more effective in detecting fraud
    (3)In any given scenario, out of all three IDS (i.e. (i) signature (ii) statistics and (iii) neural network), statistical based IDS generates most false positives (false alarms).
    (4)In any given scenario, out of four components of IDS (i.e. (i) sensor (ii) analyzer (iii) admin console and (iv) user interface) sensor collects the data and send to analyzer for data analysis.
    (5)In any given scenario, most important concern of IDS implementation is that attacks not identified/detected by IDS.

ความคิดเห็น • 10

  • @vasudhakota972
    @vasudhakota972 2 ปีที่แล้ว +3

    The most common method of detection is knowledge-based detection (also called signature-based detection or pattern-matching detection).
    It uses a database of known attacks developed by the IDS vendor.
    Primary benefit of this method is that it has a low false-positive rate.
    The second detection type is behavior-based detection (also called statistical intrusion detection, anomaly detection, and heuristics-based detection).
    Behavior-based detection starts by creating a baseline of normal activities and events on the system. Once it has accumulated enough baseline data to determine normal activity, it can detect abnormal activity that may indicate a malicious intrusion or event.
    LIMITATIONS OF THE IDS
    The following are some of the limitations of the IDS:
    IDS operate on the basis of policy definition. Weaknesses in policy definitions weaken the function of the IDS.
    IDS cannot control application-level vulnerabilities.
    IDS cannot control the backdoor into an application.
    IDS cannot analyze the data that is tunneled into an encrypted connection.
    At 10:45
    A,D are true statements.
    B is immaterial here.
    C is a wrong implementation of IDS.

  • @oluwaseunmichael5333
    @oluwaseunmichael5333 5 ปีที่แล้ว +1

    I really love your video tutorials. Please is there a comprehensive video series covering all 5 CISA domain exams?

    • @HemangDoshi
      @HemangDoshi  5 ปีที่แล้ว

      Hi dear. You will get domainwise videos at www.cisaexamstudy.com

  • @ffast123
    @ffast123 7 ปีที่แล้ว +1

    Very informative and simple to understand..great work...

  • @funluxe
    @funluxe 5 ปีที่แล้ว +1

    Thank you for all of your videos! I take my exam next month!

    • @HemangDoshi
      @HemangDoshi  5 ปีที่แล้ว +1

      All the best dear for your exam

    • @DarknetDecoded
      @DarknetDecoded 4 ปีที่แล้ว +1

      did you pass?

  • @lovarajunallamilli1605
    @lovarajunallamilli1605 2 ปีที่แล้ว

    I love your videos plz create playlist for CISA also

  • @lovarajunallamilli1605
    @lovarajunallamilli1605 2 ปีที่แล้ว

    I love your videos plz create playlist for CISA also

    • @HemangDoshi
      @HemangDoshi  2 ปีที่แล้ว

      Hi Lovaraju. You can access entire CISA course at following link: www.udemy.com/course/certified-in-information-system-audit/?referralCode=54D937D43960E2956A8C