EE4215 Tutorial 3 1. What are the common security mechanisms for safeguard an attack? <chapter3 slides 3-5> 2. State the concept and basic implementation of an Intrusion Detection architecture. Give an example. 3. What is the concept of Profile, record and Abnormality in Auditing approach? <chapter 3 slides 26-28> 4. What are the major differences between Auditing and Intrusion Detection Approaches? <Auditing – offline log, Intrusion Detection – on line detect abnormality based on preset rules> 5. What are the major differences between Identification and Authentication
This is the end of the preview.
access the rest of the document.
Prime number, Public-key cryptography, Pretty Good Privacy, Elliptic curve cryptography