Chapter 4 Securing Your Network Flashcards
What does IDS stand for?
Intrusion Detection System
What does IPS stand for?
Intrusion Prevention System
What does an IDS do?
An IDS monitors a network and send alerts when they detect suspicious events on a system or network.
What does an IPS do?
An IPS reacts to attacks in progress and prevent them from reaching systems and networks.
What does HIDS stand for?
Host-based Intrusion Detection System
What does an HIDS do?
An HIDS provides protection to the individual host and can detect potential attacks and protect critical operating system files.
Describe the logistics of an HIDS
An HIDS is additional software installed on a system such as a workstation or server.
What is the primary goal for an HIDS?
To monitor traffic
True or False : An HIDS can help with detecting malware?
True
Because of this, many organizations install a HIDS on every workstation as an extra layer of protection in addition to traditional antivirus software.
What does NIDS stand for?
Network-based Intrusion Detection System
What does an NIDS do?
An NIDS monitors activity on the network.
List some devices NIDS sensors and collectors would be installed on
Routers, Firewalls
True or False: An NIDS can decrypt/encrypt network traffic
False
An NIDS can only monitor and assess threats on the network from traffic sent in plaintext or nonencrypted traffic.
What does a tap or port mirror do and how is this beneficial for NIDS?
Allows administrators to send all traffic to a single port. It can be used as a tap to send all switch data to a sensor or collector, and forward this to a NIDS.
True or False: An IDS can prevent an intrusion
False
An IDS can only detect an intrusion
What is an attack?
Any attempt to compromise CIA - confidentiality, integrity, and/or availability
What are the two primary methods of detection?
Signature-based and heuristic ( behavioral-based)
What does a signature-based IDS do?
A signature-based IDS uses a database of known vulnerabilities or known attack patterns.
What does a heurist(behavioral-based) IDS do?
A heuristic(behavioral-based) IDS provides continuous monitoring by constantly comparing current network behavior against the baseline. When the IDS detects abnormal activity (outside normal boundaries as identified in the baseline), it gives an alert indicating a potential attack.
What is a zero-day exploit?
A zero-day exploit is where there is no patch available for the vulnerability
How does an IDS utilize logs?
An IDS analyzes logs (real-time or regular intervals) to provide insight on trends which detect a pattern of attacks and provide insight into how to better protect a network.
What triggers an IDS to report an alert or an alarm?
Rules configured within the IDS
____ is an alert or alarm on an event that is nonthreatening, benign, or harmless
A false positive
____ is when an attacker is actively attacking the network, but the system does not detect it.
A false negative