Unit 9 Discussion
Intrusion Systems and Cloud Considerations
Discuss the differences between network intrusion systems and host-based systems, detection versus prevention systems, and the different ways these systems can detect malware. Explain how a system could use cryptographic hashes to detect a compromise.
- What are the different types of cloud computing services?
- What are the issues with data ownership in the cloud?
- How does vulnerability testing differ based on the cloud model used?
Attached Files (PDF/DOCX): Unit 9 Discussion.docx
Note: Content extraction from these files is restricted, please review them manually.

Leave a Reply
You must be logged in to post a comment.