answersLogoWhite

0

Passive Systems

A passive intrusion detection sensor detects and potential security breach, logs the information and signals an alart on the console, but does not take any preventive measures to stop the attack.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What type of sensors are used in water leak detection?

There are both active and passive sensors that are used in water leak detection. Passive systems sound an alarm usually involving sound to alert one to fix the leak. An active system is similar in it's alerting system but it also takes some automated actions to try and fix the leak.


Identify the 2 actions that should be taken when a hazardous material has been identified?

The actions to be taken when a hazardous material is identified are different depending on what the situaiton is. The actions for a spill, for example are very different that for identificaiton of a hazardous material in a fire.


What are actions taken or measures put in place to eliminate a hazard or reduce the associated identified risk.?

Are actions taken or measures put in place to eliminate a hazard or reduce the associated identified risk.?


What is the class of intrusion in peace of others life?

Intrusion on someone's peace of life is typically classified as a violation of their privacy. This can include actions such as unwanted surveillance, trespassing on private property, or harassment that disrupts a person's sense of peace and security.


How can intrusion detection systems combat computer crime?

An IDS can combat computer crime in two ways - prevention and detection. When an IDS lights off an alert that a suspected intrusion is occuring, a user or system administrator can start taking actions to counteract the intrusion - severing the connection, diverting it, backing up files, changing security settings etc. Logs from an IDS can also identify areas where security needs to be improved in order to better protect a system. The logs from an IDS can also provide valuable information that may be used to track back to the miscreant who launched the attack or comitted the crime and thus bring them to justice. Making use of the logs may require considerable sophistication and skills.


Failure to develop self-rule over one's own actions is most closely identified with?

Lack of self-rule over one's actions is most closely identified with poor self-discipline or impulsivity. It can also be related to a lack of self-awareness or an inability to regulate emotions effectively.


Identify the two actions that should be taken when a hazardous material has been identified?

* Deny Entry * Isolate the hazard area


How do you do character traits?

character traits are identified by the characters dialogue, point of view, actions, moods/feelings and physical appearance


Identify two actions that should be taken when hazardous material has been identified?

Two actions that should be taken when hazardous material has been identified are first, to make sure the substance is properly contained. Second, use proper safety precautions around the material, such as wearing a breathing mask and eye protection.


Which of the following are fundamental to ORM mission success?

are actions taken or measures put in place to eliminate a hazard or reduce the associated identified risk.


What are the charcteristics of a bigot?

A bigot is someone who doesn't like a group, ethnicity, religion, or sexual orientation. A bigot can be identified by their words, their writings, and their actions.


Are actions taken or measures put in place to eliminate a hazard or reduce the associated identified risk?

Yes, that is correct. Safety measures and risk reduction actions are designed to either eliminate the hazard altogether or minimize its impact to prevent accidents or incidents from occurring. These proactive steps help create safer environments for individuals in various settings.