Question 1 a. Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in
Question 1 a. Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified. Of course, we cannot expect that there will be a crisp, exact distinction between an attack by an intruder and the normal use of resources by an authorized user. This poses a challenge to the use of IDS. Briefly discus the challenges and propose a cure. b. Blockchain is a breakthrough technology that is expected to alter most industries in the coming years and it particularly touted so because of confidentiality, authentication and integrity that it offers which makes it independent, transparent and secure. Experts says that these important principle of security are achievable because blockchains employs hash functions and public key encryption. Briefly discuss how these cryptographic techniques offer confidentiality,authentication and integrity that gives blockchain its security. Regression HW Problem Y X 26932 13 20 1. 2. 3. 4. 5. 29 18 26 23 Compute X Compute y Compute SSxy Compute SS Compute Y 30 20 10 0 Regression HW Problem 0 5 10 X 15 20 25
Step by Step Solution
There are 3 Steps involved in it
Step: 1
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started