Chapter 4 Sec + Flashcards
HIDS
Host-based Intrusion Detection System
Is installed on a workstation or a server
Monitor host,detected potential attacks
All traffic from HIDS passed through nic
NIDS
Network-based Intrusion Detection System
Monitors activity on a network
Uses sensors and collectors that are typically attached to routers and switches.
Uses a central process monitoring appliance
Cannot detect anomalies on workstations and is unable to decrypt encrypted traffic
Refered to passive since it doesn’t go directly through the IDS
Uses signature and trend base detection
NoC
Network Operations Center
IPS
Intrusion Prevention Systems
Can Detect, React and Prevent Attacks.
Refered to as active since all traffic passes through the IPS
HIPS
Host-based Intrusion Prevention System
NIPS
Network-based Intrusion Prevention Systems
APT
Advanced Persistent Threat
RAT
Remote Access Trojan are installed on internal networks through phishing or malware attacks and attacks can attack from within the internal network
WLAN
Wireless Local Area Network
AP
Wireless Access point
All wireless routers are AP
Not all aps are wireless routers
Can also provide extra service
NAT/PAT/DHCP
SSID
Service Set Identifier
Wireless networks are identified by a SSID, which is simply the wireless networking name
Can be changed by admins
WAN
Wide Area Network
2 or More LANs connected together
WEP
Wireless Equivalent Privacy
Weak protocol that’s legacy
WPA 1/2/3
Wifi Protected Access is crypto graphic protocol
Uses strong protocols such as AES and CCMP
Has 2 modes PSK and Enterprise Mode
WPA 3 uses Enhanced mode and SAE modes
EAP
Extensible Authentication Protocol
Provides a method for 2 systems to create a secure encryption key,also known as a PMK.Then uses a PTK to encrypt all data transmitted between devices
It provides an authentication framework that provides general guidance for authentication methods
PMK
Pair-wise Master Key
Used with Extensible Authentication Protocol
PTK
Pair-wise Transient Key
Used to encrypt all data transmitted between wireless devices using Extensible Authentication Protocol
PEAP
Protected Equivalent Authentication Protocol
Provides an extra layer of protection for EAP
Protects communication channel by encapsulating and encrypting the EAP conversation in a TLS tunnel
Requires a cert on the server but not client
Is implementated with Ms-CHAPv2