SlideShare a Scribd company logo
Network layers
In the event of an unknown zero-day attack, an intrusion detection system (IDS) might not
be able to detect the attack and therefore fail to alert the administrator. Any failure to detect
an attack is called a false negative. When alarms are not going off, it’s common to assume
that no malicious events are taking place. If that’s a false assumption, real attacks are
occurring and security staff is unaware.False positives may create a false sense of security
for the opposite reason—too many alarms from benign occurrences. An administrator
might react quickly to the first few alarms. However, after receiving additional false
positives, a busy administrator might put off investigating the alarms or ignore
them.Answer the following question(s):Assume you are a network administrator
responsible for security. In your opinion, which is worse—false positives or false negatives?
Why?

More Related Content

Similar to Network layers.docx

Interested in learningmore about securitySANS Institute.docx
Interested in learningmore about securitySANS Institute.docxInterested in learningmore about securitySANS Institute.docx
Interested in learningmore about securitySANS Institute.docx
mariuse18nolet
 
CASE STUDY: How to Defend the Compromised Network?
CASE STUDY: How to Defend the Compromised Network?CASE STUDY: How to Defend the Compromised Network?
CASE STUDY: How to Defend the Compromised Network?
PECB
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
zapp0
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
netwealthInvest
 
Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk
judythornell
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
Dtex Systems
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
infosec train
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
ShivamSharma909
 
Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIntrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction Technique
IDES Editor
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
 
Incident ResponseAs a security professional, you will.docx
 Incident ResponseAs a security professional, you will.docx Incident ResponseAs a security professional, you will.docx
Incident ResponseAs a security professional, you will.docx
MARRY7
 
Threat Hunters
Threat HuntersThreat Hunters
Threat Hunters
infosec train
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
AlienVault
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
infosec train
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security Officer
Dirk Cipido
 
Top risks in using NIPS - Brighttalk - July 2010
Top risks in using NIPS - Brighttalk - July 2010Top risks in using NIPS - Brighttalk - July 2010
Top risks in using NIPS - Brighttalk - July 2010
EQS Group
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
Andreanne Clarke
 
How to cure yourself of antivirus side effects @ReveeliumBlog
How to cure yourself of antivirus side effects @ReveeliumBlogHow to cure yourself of antivirus side effects @ReveeliumBlog
How to cure yourself of antivirus side effects @ReveeliumBlog
ITrust - Cybersecurity as a Service
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
msd11
 

Similar to Network layers.docx (20)

Interested in learningmore about securitySANS Institute.docx
Interested in learningmore about securitySANS Institute.docxInterested in learningmore about securitySANS Institute.docx
Interested in learningmore about securitySANS Institute.docx
 
CASE STUDY: How to Defend the Compromised Network?
CASE STUDY: How to Defend the Compromised Network?CASE STUDY: How to Defend the Compromised Network?
CASE STUDY: How to Defend the Compromised Network?
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIntrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction Technique
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Incident ResponseAs a security professional, you will.docx
 Incident ResponseAs a security professional, you will.docx Incident ResponseAs a security professional, you will.docx
Incident ResponseAs a security professional, you will.docx
 
Threat Hunters
Threat HuntersThreat Hunters
Threat Hunters
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security Officer
 
Top risks in using NIPS - Brighttalk - July 2010
Top risks in using NIPS - Brighttalk - July 2010Top risks in using NIPS - Brighttalk - July 2010
Top risks in using NIPS - Brighttalk - July 2010
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
How to cure yourself of antivirus side effects @ReveeliumBlog
How to cure yourself of antivirus side effects @ReveeliumBlogHow to cure yourself of antivirus side effects @ReveeliumBlog
How to cure yourself of antivirus side effects @ReveeliumBlog
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 

More from write30

Symposium.docx
Symposium.docxSymposium.docx
Symposium.docx
write30
 
Subprime Education.docx
Subprime Education.docxSubprime Education.docx
Subprime Education.docx
write30
 
Strategic 5 year plan.docx
Strategic 5 year plan.docxStrategic 5 year plan.docx
Strategic 5 year plan.docx
write30
 
Spinoza and Maimon were among the first Jews to join.docx
Spinoza and Maimon were among the first Jews to join.docxSpinoza and Maimon were among the first Jews to join.docx
Spinoza and Maimon were among the first Jews to join.docx
write30
 
Spanish Tongue Oppression in the United States.docx
Spanish Tongue Oppression in the United States.docxSpanish Tongue Oppression in the United States.docx
Spanish Tongue Oppression in the United States.docx
write30
 
Socrates claim in the.docx
Socrates claim in the.docxSocrates claim in the.docx
Socrates claim in the.docx
write30
 
The Epic of Gilgamesh.docx
The Epic of Gilgamesh.docxThe Epic of Gilgamesh.docx
The Epic of Gilgamesh.docx
write30
 
Using the data in the extracts and your economic evaluate.docx
Using the data in the extracts and your economic evaluate.docxUsing the data in the extracts and your economic evaluate.docx
Using the data in the extracts and your economic evaluate.docx
write30
 
The New Benefit Plan.docx
The New Benefit Plan.docxThe New Benefit Plan.docx
The New Benefit Plan.docx
write30
 
Themed of Faith in the Middle and Europe.docx
Themed of Faith in the Middle and Europe.docxThemed of Faith in the Middle and Europe.docx
Themed of Faith in the Middle and Europe.docx
write30
 
The Effect of Simulation on Identification of.docx
The Effect of Simulation on Identification of.docxThe Effect of Simulation on Identification of.docx
The Effect of Simulation on Identification of.docx
write30
 
writing about a places york.docx
writing about a places york.docxwriting about a places york.docx
writing about a places york.docx
write30
 
Write about the a fellow student in Residency at The.docx
Write about the a fellow student in Residency at The.docxWrite about the a fellow student in Residency at The.docx
Write about the a fellow student in Residency at The.docx
write30
 
WORLD ARCHAEOLOGY.docx
WORLD ARCHAEOLOGY.docxWORLD ARCHAEOLOGY.docx
WORLD ARCHAEOLOGY.docx
write30
 
Telephony Signaling.docx
Telephony Signaling.docxTelephony Signaling.docx
Telephony Signaling.docx
write30
 
Three Sociological Paradigms.docx
Three Sociological Paradigms.docxThree Sociological Paradigms.docx
Three Sociological Paradigms.docx
write30
 
Sources and Collection of Data.docx
Sources and Collection of Data.docxSources and Collection of Data.docx
Sources and Collection of Data.docx
write30
 
SPH 511 Exposure Assessment Report.docx
SPH 511 Exposure Assessment Report.docxSPH 511 Exposure Assessment Report.docx
SPH 511 Exposure Assessment Report.docx
write30
 
Species Briefing Report.docx
Species Briefing Report.docxSpecies Briefing Report.docx
Species Briefing Report.docx
write30
 
The Model.docx
The Model.docxThe Model.docx
The Model.docx
write30
 

More from write30 (20)

Symposium.docx
Symposium.docxSymposium.docx
Symposium.docx
 
Subprime Education.docx
Subprime Education.docxSubprime Education.docx
Subprime Education.docx
 
Strategic 5 year plan.docx
Strategic 5 year plan.docxStrategic 5 year plan.docx
Strategic 5 year plan.docx
 
Spinoza and Maimon were among the first Jews to join.docx
Spinoza and Maimon were among the first Jews to join.docxSpinoza and Maimon were among the first Jews to join.docx
Spinoza and Maimon were among the first Jews to join.docx
 
Spanish Tongue Oppression in the United States.docx
Spanish Tongue Oppression in the United States.docxSpanish Tongue Oppression in the United States.docx
Spanish Tongue Oppression in the United States.docx
 
Socrates claim in the.docx
Socrates claim in the.docxSocrates claim in the.docx
Socrates claim in the.docx
 
The Epic of Gilgamesh.docx
The Epic of Gilgamesh.docxThe Epic of Gilgamesh.docx
The Epic of Gilgamesh.docx
 
Using the data in the extracts and your economic evaluate.docx
Using the data in the extracts and your economic evaluate.docxUsing the data in the extracts and your economic evaluate.docx
Using the data in the extracts and your economic evaluate.docx
 
The New Benefit Plan.docx
The New Benefit Plan.docxThe New Benefit Plan.docx
The New Benefit Plan.docx
 
Themed of Faith in the Middle and Europe.docx
Themed of Faith in the Middle and Europe.docxThemed of Faith in the Middle and Europe.docx
Themed of Faith in the Middle and Europe.docx
 
The Effect of Simulation on Identification of.docx
The Effect of Simulation on Identification of.docxThe Effect of Simulation on Identification of.docx
The Effect of Simulation on Identification of.docx
 
writing about a places york.docx
writing about a places york.docxwriting about a places york.docx
writing about a places york.docx
 
Write about the a fellow student in Residency at The.docx
Write about the a fellow student in Residency at The.docxWrite about the a fellow student in Residency at The.docx
Write about the a fellow student in Residency at The.docx
 
WORLD ARCHAEOLOGY.docx
WORLD ARCHAEOLOGY.docxWORLD ARCHAEOLOGY.docx
WORLD ARCHAEOLOGY.docx
 
Telephony Signaling.docx
Telephony Signaling.docxTelephony Signaling.docx
Telephony Signaling.docx
 
Three Sociological Paradigms.docx
Three Sociological Paradigms.docxThree Sociological Paradigms.docx
Three Sociological Paradigms.docx
 
Sources and Collection of Data.docx
Sources and Collection of Data.docxSources and Collection of Data.docx
Sources and Collection of Data.docx
 
SPH 511 Exposure Assessment Report.docx
SPH 511 Exposure Assessment Report.docxSPH 511 Exposure Assessment Report.docx
SPH 511 Exposure Assessment Report.docx
 
Species Briefing Report.docx
Species Briefing Report.docxSpecies Briefing Report.docx
Species Briefing Report.docx
 
The Model.docx
The Model.docxThe Model.docx
The Model.docx
 

Recently uploaded

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 

Recently uploaded (20)

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 

Network layers.docx

  • 1. Network layers In the event of an unknown zero-day attack, an intrusion detection system (IDS) might not be able to detect the attack and therefore fail to alert the administrator. Any failure to detect an attack is called a false negative. When alarms are not going off, it’s common to assume that no malicious events are taking place. If that’s a false assumption, real attacks are occurring and security staff is unaware.False positives may create a false sense of security for the opposite reason—too many alarms from benign occurrences. An administrator might react quickly to the first few alarms. However, after receiving additional false positives, a busy administrator might put off investigating the alarms or ignore them.Answer the following question(s):Assume you are a network administrator responsible for security. In your opinion, which is worse—false positives or false negatives? Why?