fbpx
You should be aware of many security terms that are related to intrusion detection and prevention technologies

VULNERABILITY

A vulnerability is a weakness that compromises the security or functionality of a particular system in your network. An
example of a vulnerability is a web form on your public website that does not adequately filter inputs and guard against
improper data entry. An attacker might enter invalid characters in an attempt to corrupt the underlying database.

EXPLOIT

An exploit is a mechanism designed to take advantage of vulnerabilities that exist in your systems. For example, if you have poor passwords in use in your network, a password-cracking package might be the exploit aimed at this vulnerability.
 
 

 

False alarms

False alarms are IPS events that you do not want occurring in your implementation. There are two types of these alarms:
false positive and false negative. Both are undesirable.
 
False positive
A false positive means that an alert has been triggered, but it was for traffic that does not constitute an actual attack. This type of traffic is often referred to as benign traffic.
 
False negative
A false negative occurs when attack traffic does not trigger an alert on the IPS device. This is often viewed as the worst
type of false alarm, for obvious reasons.
 

True alarms

There are two types of true alarms in IPS terminology. Both true positives and true negatives are desirable.
 
True positive
A true positive means that an attack was recognized and responded to by the IPS device.
 
True negative
This means that non-offending or benign traffic did not trigger an alarm.
 
 

This Article Was Written & published by Meena R,  Senior Manager - IT, at Luminis Consulting Services Pvt. Ltd, India. 

Over the past 16 years, Meena has built a following of IT professionals, particularly in Cybersecurity, Cisco Technologies, and Networking...

She is so obsessed with Cybersecurity domain that she is going out of her way and sharing hugely valuable posts and writings about Cybersecurity on website, and social media platforms. 

34,000+ professionals are following her on Facebook and mesmerized by the quality of content of her posts on Facebook. 

If you haven't yet been touched by her enthusiastic work of sharing quality info about Cybersecurity, then you can follow her on Facebook:

Click Here to follow her: Cybersecurity PRISM