Chapter 4 Flashcards
What do IDSs do?
IDSs monitor a network and send alerts when they detect suspicious events
What do IPSs do?
IPSs react to attacks in progress and prevent them from reaching systems and networks
Acronym
HIDS
Host-based Intrusion Detection System
Definition
What is HIDS
It is additional software installed on a system that
* monitors the individual host
* can detect potential attacks
* analyzes critical operating system files
HIDS can monitor all traffic on a single host system
Acronym
NIDS
Network-based Intrusion Detection System
monitors and assesses threats on the network from traffic sent in plaint
What do NIDS sensors do?
Gather information and report to a central monitoring network appliance hosting a NIDS console
sensors AKA collectors
What can a NIDS NOT do?
- Detect anomalies that don’t change network traffic
- Decrypt encrypted traffic
What is port mirroring?
AKA port spanning
configuring a switch to send all the traffic it receives to a single port
Where should you place a sensor if you want to see all attacks on your network?
On the internet side
Where should you place a sensor if you only want to see attacks that get through on your network?
On the internal network
Where are NIDS sensors installed?
Network devices: switches, routers, or firewalls
What are the two primary detection methods
- Signature based
- heuristic/behavioral-based/anomaly based
How do signature based IDSs detect attacks?
They use a database of known vulnerabilities or known attack patterns
How do Trend based IDSs detect attacks?
- Identifies the network’s normal behavior and creates a baseline
- when abnormal activity is detected, it gives an alert
Good at detecting zero day exploits
What are zero day exploits
vulnerabilities that are unknown to the vendor. There is no patch for the vulnerability
IDS aggregator
Stores log entries from dissimilar systems
Acronym
NOC
Network Operations Center
IDS False Positive
An alert or alarm on an event that is non threatening or harmless
opposite of true positive
IDS False negative
A real attack that is undetected by the system
Opposite of true negative
What does a high incidence of false positives cause?
Increasr of the administrator’s workload
Differences between IPS and IDS
- IPS can detect, react to, and prevent attacks while IDS an only detect and react
- IPS is in-line with the traffic - traffic goes through the IPS while IDS is out of band. Monitors the network but traffic doesnt go through it
- IPS is referred to as Active, IDS is referref to as Passive
Acronym
RAT
Remote Access Trojan
Acronym
APT
Advanced Persistent Threat
Honeypot
A server that looks like an easy target so attackers spends their time in the honeypot instead of on the real network
Honeynet
A group of honeypots within a separate network but accessible from an organization’s primary network
Honeyfile
A file designed to attract the attention of an attacker
Honeytoken
Fake data or credentials planted within a system to detect unauthorized access attempts
Acronym
WLAN
Wireless Local Area Networks
What does a wireless access point(AP) do?
Connects wireless clients to a wired network
What are APs with routing capabilites marketed as?
Wireless routers
All wireless routers are APs but not all APs are wireless routers
Acronym
WAN
Wide Area Network
Acronyms
NAT and PAT
- Networks Address Translation
- Port Address Translation
Acronym
DHCP
Dynamic Host Configuration Protocol
Acronym and Definition
SSID
Service Set Identifier
The name of the wireless network
What is MAC Filtering
Restricting access to a network based on the MAC address
What is MAC address cloning
Changing the MAC address address on a device to match the MAC address of another device, typically the WAN port on an internet-facing router
spoofing a MAC address is easy
What is a site survey?
examining a wireless environment to identify issues like areas with noise or potential security issues
What do Wi-Fi analyzers do?
Identify and analyze activity on channels within the same wireless spectrum
A site survey tool
What is a heat map
It gives a color coded representation of wireless signals
A site survey tool
Wireless footprinting
Gives a detailes diagram of wireless APs, hotspots, and dead spots within an organization
Acronym
WEP
Wired Equivalent Privacy
Acronym
WPA
Wi-Fi Protected Access
Which wireless cryptographic protocols should not be used and why?
- WEP and WPA
- These protocols are weak and deprecated
Acronym
WPA2
- Wi-Fi Protected Access 2
- Uses AES and Counter-mode/CBC-MAC
Acronym
AES
Advanced Encryption Standard
Acronym
CCMP
Counter-mode/CBC-MAC