In intrusion detection, a set of rules used to detect typical intrusive activity is referred to as _______.

  • Encryption
  • Firewall
  • Honeypot
  • Signature
In intrusion detection systems, a 'Signature' is a set of rules used to detect typical intrusive activity. These rules help identify known patterns of attacks or breaches.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *