Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

M4

1. Use the concept of Signature detection in realizing an intrusion detection system


2. Use the concept of Anomaly detection in realizing an intrusion detection system
3. Utilize the concept of Host-based Intrusion detection system (HIDS) in supporting Intrusion detection.
4. Utilize the concept of Network-based Intrusion detection system (NIDS) in supporting Intrusion detection.
5. Describe various virus counter measures
a. Perimeter scanning approaches
b. Host based behavior blocking approaches
c. Generic decryption
6. Explain the approaches to Intrusion detection system.
7. Explain following anomaly detections
a. Statistical anomaly detection
b. Rule based anomaly detection
8. Explain the architecture of distributed intrusion detection system
9. List and explain various virus counter measures

M5

1. Discuss the important characteristics of firewall access policy


2. Discuss the need for firewalls
3. Apply the concept of Circuit Level Gateway in setting firewall between end users.
4. Apply the concept of Application Level Gateway in setting firewall between end users.
5. Apply the concept of Virtual Private Networks in setting firewall for multisite office setup.
6. Apply the concept of Distributed firewalls in setting firewall for multisite office setup.

You might also like