Ch 4. Securing Your Network Flashcards
HIDS
host based intrusion detection system; software installed on a system to detect attacks. It protects local resources on the host. A HIPS is an extension of HIDS and detects and blocks attacks.
NIDS
network based intrusion detection system; a device that detects attacks and raises alerts. A NIDS is installed on network devices, such as routers or firewalls. and monitors network traffic.
Port Mirror
a monitoring port on a switch. All traffic going through the switch is also sent to the port mirror.
Taps
monitoring ports on a network device. IDSs use taps to capture traffic.
Signature Based Detection
a type of monitoring used on intrusion detection and intrusion prevention systems that detects attacks based on known attack patterns documented as attack signatures
Heuristic/Behavioral/Anomaly Based Detection
a type of monitoring that can detect unknown anomalies. They start with a performance baseline of normal behavior and then compare network traffic against this baseline. When traffic differs significantly from the baseline, the IDS sends an alert.
inline
an IPS is inline with traffic. All traffic passes through the IPS and the IPS can block malicious traffic.
out-of-band
an IDS is out-of-band. It monitors the network traffic, but the traffic doesn’t go through the IDS.
RAT
Remote Access Trojan; malware that allows an attacker to take control of a system from a remote location
SSL/TLS Accelerator
device used to handle TLS traffic. Severs can off-load TLS traffic to improve performance.
SSL Decryptor
device used to create separate SSL (or TLS) sessions. They allow other security devices to examine encrypted traffic sent to and from the internet.
SDN
software defined network; a method of using software and virtualization technologies to replace hardware routers. SDNs separate the data and control planes.
Honeypot
a server that’s left open or appears to have been sloppily locked down, allowing an attacker relatively easy access. Diverts the attacker away from the live network.
IEEE 802.1x
a server that provides port-based authentication, ensuring that only authorized clients can connect to a network. It prevents rogue devices from connecting.
AP
access point; a device that connects wireless clients to wireless networks. Sometimes called a wireless access point (WAP)
Fat AP
includes everything needed to connect wireless clients to a wireless network. Typically includes features such as a routing component, NAT, DHCP, ACLs, etc. Must be configured separately.
Thin AP
managed by a wireless controller who configures the AP