Discussion Post
a) List and briefly define three classes of intruders.
b) What are two common techniques used to protect a password file?
c) What are three benefits that can be provided by an intrusion detection system?
d) What is the difference between statistical anomaly detection and rule-based intrusion detection?
e) What metrics are useful for profile-based intrusion detection?
f) What is the difference between rule-based anomaly detection and rule-based penetration identification?
g) What is a honeypot?
h) What is a salt in the context of UNIX password management?
i) List and briefly define four techniques used to avoid guessable passwords.
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.