Sometime Today, Kishor Bhagwat assembled some asciibets to say:
Impact: what is the cost of recovering from an attack
Impact has to include cost of damage done too. For eg.Whats the impact of losing a product design before its patented?
I'd still consider that cost of recovery. In this case, since recovery isn't possible, the cost is extremely high, and therefore, so is the Impact. The presence of such information also increases the Threat. In such a situation, security needed will be very high.
actually, one host cannot be used for an entire network(unless you have a very small network), since the IDS sensors would get traffic
right. You'd have things like snort running on different segments of your network.
I think you missed out talking about sniffers.
The lecture was to be about 45 minutes, and the audience had no background whatsoever, so I did what I could. Maybe someone else should add to this thread, how 'bout you?
Philip