answersLogoWhite

0


Best Answer

Passive Systems

A passive intrusion detection sensor detects and potential security breach, logs the information and signals an alart on the console, but does not take any preventive measures to stop the attack.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which type of Intrusion Detection System can only take logging and alerting types of actions when an attack is identified?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What type of sensors are used in water leak detection?

There are both active and passive sensors that are used in water leak detection. Passive systems sound an alarm usually involving sound to alert one to fix the leak. An active system is similar in it's alerting system but it also takes some automated actions to try and fix the leak.


Identify the 2 actions that should be taken when a hazardous material has been identified?

The actions to be taken when a hazardous material is identified are different depending on what the situaiton is. The actions for a spill, for example are very different that for identificaiton of a hazardous material in a fire.


What are actions taken or measures put in place to eliminate a hazard or reduce the associated identified risk.?

Are actions taken or measures put in place to eliminate a hazard or reduce the associated identified risk.?


Are actions taken or measures put in place to eliminate a hazard or reduce the associated identified risk?

Are actions taken or measures put in place to eliminate a hazard or reduce the associated identified risk.?


How can intrusion detection systems combat computer crime?

An IDS can combat computer crime in two ways - prevention and detection. When an IDS lights off an alert that a suspected intrusion is occuring, a user or system administrator can start taking actions to counteract the intrusion - severing the connection, diverting it, backing up files, changing security settings etc. Logs from an IDS can also identify areas where security needs to be improved in order to better protect a system. The logs from an IDS can also provide valuable information that may be used to track back to the miscreant who launched the attack or comitted the crime and thus bring them to justice. Making use of the logs may require considerable sophistication and skills.


Failure to develop self-rule over one's own actions is most closely identified with?

GUILT


How do you do character traits?

character traits are identified by the characters dialogue, point of view, actions, moods/feelings and physical appearance


Identify the two actions that should be taken when a hazardous material has been identified?

* Deny Entry * Isolate the hazard area


Identify two actions that should be taken when hazardous material has been identified?

Two actions that should be taken when hazardous material has been identified are first, to make sure the substance is properly contained. Second, use proper safety precautions around the material, such as wearing a breathing mask and eye protection.


What is implicit norms?

Implicit norms are unwritten, unspoken rules or customs that are understood and followed by members of a society or group based on cultural expectations. These norms are often ingrained and may not be explicitly stated, but members are expected to conform to them in order to be accepted by the group.


How do you identify character traits?

character traits are identified by the characters dialogue, point of view, actions, moods/feelings and physical appearance


What are the charcteristics of a bigot?

A bigot is someone who doesn't like a group, ethnicity, religion, or sexual orientation. A bigot can be identified by their words, their writings, and their actions.