What do you mean by interruption, interception, modification and fabrication from the context of Information Systems Security? Give two examples for each of these terms.
What are the advantages of using HIDS?
What is an IPS? Define the types of IPS'?
What is the difference between a frame and a packet?
What are the different types of IDS architectures?
What are the advantages of using the single tier IDS architecture?
How can network-based IDS be implemented in a heavily swished environment? Discuss the various options available.