— Sloth Boss
Authentication Required
Permission Required
Open menu
Powered by
Powered by
Return to Mastery Progress
Cybersecurity
How to Catch a Hacker: Signature vs. Anomaly Detection
Article
5min
Rise
Description
Back
Next:
The Rulebook for Security: What is a Security Policy?
Mark as Complete
Like
Bookmark
Share
cisecurity.org
Cybersecurity Spotlight – Signature-Based vs Anomaly-Based Detection
Signature-based and anomaly-based detections are the two main methods of identifying and alerting on threats.
View Content