Intrusion Detection
Look for unusual access patterns or activity
Types of evaluation
statistical
rule-based
Example: lock account after 3 failed login attempts
Assume all systems are subject to attempted unauthorized use
Previous slide
Next slide
Back to first slide
View graphic version