Computer Science, asked by bunnyowl1386, 1 year ago

This detection model operates on a whitelist principle instead of a blacklist principle. Anomaly detection misuse detection specification detection risk assessment detection

Answers

Answered by aniyanelson
1

bfyguiuasgilhagyuaaafhgbheeeeeeeeeejjjjjjjjjjjjjjjdddssssssss

Answered by rohitsingh1818
9

This model is similar to misuse detection, except that it operates on a whitelist principle instead of a blacklist. Whitelist principles are: we know what is good, and what is not good is bad. Any behavior that does not correspond to predefined specifications must be considered suspicious.

HOPE IT HELPS

PLEASE MAKE ME BRAINLIEST ☺️

Similar questions