CH-9 Virus Scanners Flashcards
What Are Virus Scanners Used For?
- to prevent a virus from infecting the system
- Run continuously and/or on-demand
- Search for recognizing characteristics of a known virus
- Virus Scanner and anti-spyware software work according to the same principles, and both are often integrated into a single app.
How to Virus Scanners Work?
Scanners work in two ways:
– Signature matching (definitions): Scans host, network, and email for a match
- List of all known virus definitions
- Updating consists of replacing this file
– Behavior matching (heuristic):
- Attempts to write to the boot sector
- Changing system files
- Automated email sending
- Self-multiplying
Enumerate Virus Scanning Techniques
- E-mail and attachment scanning
- Download scanning
- File scanning
- Heuristic scanning
- Sandboxing
- Machine learning
What is a Firewall and what does it do?
A barrier between your network and the outside world.
It Filters packets based on
– Size
– Source IP
– Protocol
– Destination port
■ Need dedicated firewall between trusted network and untrusted network
■ Firewalls can be hardware or software (and both can be used together)
■ Types include Packet Filter, Stateful Packet Inspection, and Application
What is a Firewall Stateful Packet Inspection?
Stateful inspection (also known as the dynamic packet filtering)
- Monitors the active connections on a network.
- Determines which network packets should be allowed through based on information regarding active connections.
Stateful inspection keeps track of each connection and constantly checks if they are valid.
What is Application Firewall?
- An enhanced firewall that limits access at the application level
- Controls the execution of files or the handling of data by specific applications
- By being aware of specific applications, it can watch for known malicious traffic
Ex: Oracle Web Application Firewall (WAF): protecting web-facing applications from DDoS attacks. Utilize F5 Networks to decrypt and inspect traffic before it enters the network.
What is a Host-Based Firewall Configuration?
– Software solution installed on an existing operating system
– Weakness: It relies on the OS
– Must harden the existing operating system
What is a Dual-homed host Firewall Configuration?
– Installed on a server with at least two network interfaces
– Systems inside and outside the firewall can communicate with the dual-homed
host, not with each other
– Dual homed hosts are great targets for attack since they can bridge networks
What is Router-based Firewall Configuration used for?
- Small Office/ Home Office (SOHO)
- SPI for mid-large enterprise devices
What is SPI?
Serial Peripheral Interface: interface bus commonly used to send data between microcontrollers and small peripherals such as shift registers, sensors, and SD cards. It uses separate clock and data lines, along with a select line to choose the device you wish to talk to.
Describe Firewall as a Service
– Emerging cloud-based firewalls
– Protects 3 rd party cloud services and infrastructure
– All traffic to and from your cloud services must pass through the FWaaS
– Addresses the challenges that cloud services create for a secure perimeter
What is a good source for IT Solutions landscape?
Gartner Magic Quadrant
What is Firewall Logs?
- All firewalls log activity
- Logs can provide valuable information
- Can locate the source of an attack
- Can prevent a future attack
- Can be manually reviewed or analyzed in real-time by SIEMs
What is SIEM?
Security information and event management
SIEM tools are an important part of the data security ecosystem: they aggregate data from multiple systems and analyze that data to catch abnormal behavior or potential cyberattacks.
SIEM tools provide a central place to collect events and alerts – but can be expensive, resource-intensive, and customers report that it is often difficult to resolve problems with SIEM data.
What is Demilitarized Zone (DMZ) in Data Security?
- Adds an additional layer of security to an organization’s local area network (LAN)
- Segregates computers on each side of a firewall
- Exposes an organization’s external-facing services to an untrusted network
- Usually, a larger network such as the Internet
- If a server in a DMZ is hacked, the hacker does not have access to the internal network