Read the NIST Special Publication 800-94
Discuss in technical, detail, how instrusions are detected
Are graghics, infographics ir visualizations used in intrustion detection?
Give an example
How is AI used for detecting intrusion detection?
What attributes does AI intrusion detection software look for?
What must be done to resolve an intrusion?
Name at atleast(2) technical methods of blocking an intruder.
Why do we document intrusions?
What information should be in an intrusion report?
Why is this information helpful?
Provide a sample blank form for reporting an incident