Chapter 6 - Security App & Devices Flashcards
What is IDS?
Intrusion Detection System is a device or a piece of software that’s installed on a system or a network, & it will analyze all of the data that passes through it.
Intrusion Detection Systems come in two different varieties, what are they?
- HIDS (Host-based IDS)
* NIDS (Network-based IDS)
What is HIDS & What does it do?
HIDS=
This usually takes the form as a piece of software that’s installed on ur computer or on a server & it will protect it.
(Now, the host-based Intrusion Detection System will sit there and log everything that it thinks is suspicious.)
What is NIDS & What does it do?
NIDS=
This is a piece of hardware that’s installed on ur network. & all the traffic goes through that switch, & then it will get a copy of that sent down to the Network Intrusion Detection System. If it’s suspicious, it’ll log it and it’ll alert on it.
How do we know what HIDS & NIDS will alert on?
They’re going to use detection methods. There are 3
(1) Signature-based,
(2) Policy-based
(3) Anomaly-based detection.
What is the Signature-based detection method do?
Signature-based detection is where the system is looking for a specific string of bytes that’ll trigger the alert. This works like any other signature-based product.
This computer is going to continually search over & over for a known specific key. & any time it sees that combination of letters or bytes, it knows that it’s malicious. It’ll flag it and it will alert on it.
What is the Policy-based detection method do?
This is going to rely on a specific declaration of the security policy. 4 example, if ur company has a policy that no one is allowed to use Telnet, any time this system sees somebody trying to connect on port 23, which is the port for Telnet, it’s going to flag it, log it, & alert on it.
What is the Anomaly-based detection method do?
Often, this is referred to as just anomaly-based detection or statistical-based detection. This is going to analyze all of the current traffic patterns against an established baseline, & anytime it sees something that goes outside the statistical norm, it’s going to alert on it. So, if I’ve been watching ur network for a while & I know what normal looks like, & everybody always works from nine in the morning until five in the afternoon, & now I start seeing somebody downloading large amounts of data around two o’clock in the morning, that’s outside our normal baseline & we would flag that and alert on that.
What are the types of Alerts that HIDS & NIDS can give?
(1) True Positive= Malicious activity is identified as an attack (means something bad happened & the system flagged it & alerted on it)
(2) False Positive= Legitimate activity is identified as an attack (if the system thought that was malicious & flagged it and alerted on it)
(3) True Negative= Legitimate activity is identified as legitimate traffic (means something good or normal happened & the system didn’t flag it.)
(4) False Negative= Malicious activity is identified as legitimate traffic (This is when something bad happens but it’s identified as legitimate activity. In other words, it isn’t flagged and it wasn’t alerted on)
What can and can’t IDSs do? & what can be done to improve that?
(1) Can alert but won’t stop it
* If you want an IDS to stop you need to invest in an IPS(Intrusion Prevention System)
What is an IPS?
They work very similarly to an IDS except they have the ability to stop malicious activity from being executed
____ logs are used to recreate the events after an attack has occurred?
HIDS (host-based IDS)
What are some Pop-up Blockers?
- Malicious attackers could purchase ads (pay per click) through various networks
(1) Content Filters= Blocking of external files containing JavaScript, images, or web pages from loading in a browser. - ensure browser & extensions are updated regularly
What are DLP?
Date Loss Prevention (DLP) are systems that are either software or hardware solutions
*In summary, these data loss prevention solutions are made to be accurate in a way that they stop data from leaving your network. They’re going to go through and look at data at rest, data in use, and data in transit, to ensure that it’s following the policies you’ve set up as a security administrator, so u could protect that asset of your company.
What are the different DLPs?
(1) Endpoint DLP System= An endpoint system is usually a piece of software that’s installed on a workstation or a laptop, & it’s going to monitor the data that’s in use on that computer. & if someone tries to do a file transfer, it’ll either stop that file transfer, or it’ll alert the admin of the occurrence based on certain rules and policies. Very much like an IDS or an IPS would, but focused on data.
(2) Network DLP System= This is a piece of software or hardware that’s a solution placed at the perimeter of your network. It’s sole function in life is to check all of the data going into & out of your network, w/ a special focus on things going out of the network. They want to detect data in transit that shouldn’t be leaving the building.
(3) Storage DLP System= This is a software that’s installed on a server in the data center & inspects the data while its at rest on the server. This is usually because they’ve encrypted it or watermarked it, & we want to make sure that nobody’s accessing the data at times that the shouldn’t be. For example, if someone starts downloading large amounts of data at two in the morning, that’s probably against your policy & the DLP could catch it.
(4) Cloud DLP System= These systems are usually offered as software-as-a-service, & it’s part of your cloud service and storage needs. They’re going to protect your data when it’s stored inside those cloud services. For example, my company uses Google Drive & we have data loss prevention as part of a cloud service, offered by Google.