The effectiveness of the current detection method for the intrusion detection systems within your company is contingent on an established baseline to compare traffic too. What is method is your company using?
Heuristic
Signature-based
Anomaly
Behavior-based
Implementation | |
Architecture and Design | |
Operations and Incident Response | |
Governance, Risk, and Compliance | |
Attacks, Threats, and Vulnerabilities |