what is an IDS?
Any set of actions that attempt to compromise theconfidentiality, integrity, or availability of a computer resource is called as ids.
COMPUTER SECURITY AND ROLES:
-Confidentiality:
Transforming data such that only authorized parties can decode it.
Authentication:
-Proving or disproving someone's or something's claimed identity.
Integrity checking:
-Ensuring that data cannot bemodified without such modification being detectable.
Non repudiation:
-Proving that a source of somedata did in fact send data that he might later deny sending.
TYPES OF VIOLATIONS:
Attack
-Attempts to exploit a vulnerability
-Ex: denial of service, privilege escalation
Intrusion
-Acts as another legitimate user
Misuse
-User abuses privileges
-Often called the "insider threat"