Intrusion Detection Systems-presentation slides
Intrusion: Break into, misuse, or exploit a system (against policy)
Intruders: Insiders or outsiders Most IDS are designed for outsiders
Vulnerability: Weakness that could be used by the attacker
Threat: Party that exploits a vulnerability Structured Threat: Adversaries with a formal methodology, a
financial sponsor, and a defined objective.
Unstructured Threat: Compromise victims out of intellectual curiosity