Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Describe the term intrusion detection in the context of IT-
security?

Answer Posted / vinay

it means someone tried to hack the security of the network.

Is This Answer Correct ?    1 Yes 5 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How do we do authentication with message digest(md5)?

1017


Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?

1042


Difference between bit rate and baud rate.

1178


What is adware?

1078


What is ransomware?

1046


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

1004


What is information security?

1275


What does cia stand for in security management?

1149


What is an arp and how does it work?

1247


What is slowloris?

1004


What is cybersecurity?

1083


Explain for a small lan which class of addressing is used?

1012


What is intrusion prevention systems (ips)?

1067


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

1005


How to you keep yourself updated on network security ?

1146