CH04 Security Applications and Devices Flashcards

1
Q

What is IDS ?

A

IDS = Intrusion Detection System.

device or software application that monitors a system or network and analyzes the data passing through it in order to identify an incident or attack

IDS can only alert and log suspicious activity, they won’t be able to stop it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 2 varieties of IDS ?

A

IDS = Intrusion Detection System.

It has 2 varieties :
HIDS - Host-based IDS
NIDS - Network-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is HIDS ?

A

HIDS = Host-based IDS

It is a software installed on a computer or server to protect it. It will log everything that seems suspicious.

HIDS logs are used to recreate the events after an attack has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is NIDS ?

A

NIDS = Network-based IDS

hardware installed on your network and all the traffic goes through that switch, and then it will get a copy of that sent down to the Network Instruction Detection System. If suspicion is found, it will log it and alert on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Signature-based detection method?

A

system is looking for a specific string of bytes that’ll trigger the alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Policy-based detection method?

A

rely on a specific declaration of the security policy. For example, if company has a policy that no one is allowed to use Telnet, any time this system sees somebody trying to connect on port 23, which is the port for Telnet, it’s going to flag it, log it, and alert on it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Anomaly-based detection method ?

A

Analyzes the current traffic patterns against an established baseline and any time it sees something that goes outside the statistical norm, triggers an alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are :
True positive alert
False positive alert
True negative alert
False negative alert

A

▪ True positive - Malicious activity is identified as an attack
▪ False positive - Legitimate activity is identified as an attack
▪ True negative - Legitimate activity is identified as legitimate traffic
▪ False negative - Malicious activity is identified as legitimate traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is IPS ?

A

IPS = Intrusion Prevention System
IPS can stop malicious activity from being executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DLP ?

A

DLP = Data Loss Prevention

monitors the data of a system to detect attempts to steal the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Endpoint DLP system ?

A

DLP = Data Loss Prevention

Software-based client that monitors the data in use on a computer and can stop a file transfer or alert an admin of the occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Network DLP System ?

A

DLP = Data Loss Prevention

Software or hardware-based solution that is installed on the perimeter of the network to detect data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Storage DLP System ?

A

DLP = Data Loss Prevention

Software installed on servers in the datacenter to inspect the data at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Cloud DLP System ?

A

DLP = Data Loss Prevention

Cloud software as a service that protects data being stored in cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is BIOS ?

A

BIOS = Basic Input Output System

Firmware that provides the computer instructions for how to accept input and send output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is UEFI ?

A

UEFI = Unified Extensible Firmware Interface

More updated and robust version of BIOS

17
Q

What are the ways that we can secure BIOS ?

A

BIOS = Basic Input Output System

  1. Flash the BIOS – ensures that it has the most up to date software on that chip.
  2. Use a BIOS Password – this will prevent anyone from being able to log into the BIOS and change the boot order or other settings without having this administrative password.
  3. Configure the BIOS boot order – only enable boot from the internal hard disk and then from the network card. This protects me from somebody putting in a bootable distribution OS on a CD and take control of my computer.
  4. Disable external ports and devices that you do not use.
  5. Enable the secure boot option - When secure boot option is enabled, your computer goes through additional processes as it boots up. When the BIOS is loaded, it’s going to go through and load the public key from the trusted platform module chip, known as the TPM, that’s sitting inside your processor. It’s going to use this to verify the code of the operating system that’s being loaded and ensure that it’s been digitally signed by the manufacturer and that it hasn’t been modified since. This ensures that you have a trusted boot device, and ensures that you have a protected boot process, and your system is going to be much more secure.
18
Q

What is NAS?

A

NAS = Network Attached Storage

▪ Storage devices that connect directly to your organization’s network
▪ NAS systems often implement RAID arrays to ensure high availability

19
Q

How do you secure SAN ?

A

SAN = Storage Area Network

  1. Use Data encryption
  2. Use proper authentication
  3. Log NAS (Network Attached Storage) access
19
Q

What is SAN?

A

SAN = Storage Area Network

Network designed specifically to perform block storage functions that may consist of NAS (Network Attached Storage) devices connected together

20
Q

What is SED ?

A

SED = Self-Encrypting Drive

Storage device that performs whole disk encryption by using embedded hardware

21
Q

What are the encryption software most commonly used ?

A

FileVault (MAC)
BitLocker (Windows)

22
Q

What is TPM ?

A

TPM = Trusted Platform Module

Chip residing on the motherboard that contains an encryption key

23
Q

What is Advanced Encryption Standard ?

A

Symmetric key encryption that supports 128-bit and 256-bit keys

24
Q

What is HSM ?

A

HSM = Hardware Security Module

Physical devices that act as a secure cryptoprocessor during the encryption process

25
Q

What is HIDS / HIPS ?

A

HIDS = Host Intrusion Detection Systems
HIPS = Host Intrusion Prevention Systems

A type of IDS (Intrusion Detection Systems) or IPS (Intrusion Prevention Systems) that monitors a computer system for unexpected behavior or drastic changes to the system’s state on an endpoint

26
Q

What is EPP ?

A

EPP = Endpoint Protection Platform

A software agent and monitoring system that performs multiple security tasks such as anti-virus, HIDS/HIPS (Host Intrusion Detection Systems / Host Intrusion Prevention Systems), firewall, DLP (Data Loss Prevention), and file encryption

27
Q

What is EDR ?

A

EDR = Endpoint Detection and Response

A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats

EDR focuses more on behavioral and anomaly analysis. It starts logging the endpoint’s observables and indicators and combines that with analysis and tries to figure out what’s wrong.

EDR does not prevent initial execution, but instead, provides runtime and historical visibility into a compromise, and once you’ve been detected, it can start responding to that and it helps you as an incident responder to gather more information and facilitate your remediation to get it back to its original state.

28
Q

What is UEBA ?

A

UEBA = User and Entity Behavior Analytics

A system that can provide automated identification of suspicious activity by user accounts and computer hosts

It is heavily dependent on advanced computing techniques like artificial intelligence (AI) and machine learning