- Different security systems can be configured for different responses to traps and alarms.
- Reactions can be as limited as logging and error, sending E-Mail, or activating a pager.
- Reactions can be as severe as mounting a counter attack or shutting down system access.
- Systems can be set up to reconfigure firewalls to block ongoing intrustion attempts to individual systems or entire networks.
No notes for slide 26