European Proceedings Logo

Penetration Tools To Prevent Organizational Data Security Breaches

Table 2:

Advantages Disadvantages
It is the very helpful for finding attacks and blocking. It has to manually coded and definition the novel attacks when detection the attack of the system.
It is making actively reporting, prevention and learning. The approach is based anomaly detection is not possible to establish the relation between the events.
They are not passive safety devices such as firewalls and routers. Intrusion detection systems produce significantly false alarms
It can be found security weaknesses of the attack behavior. At which point they may need to be strengthened. Attack to be made on data mining can not work as much data when the system is active.
< Back to article