Domain 3 continued Flashcards
system (NIDS)/network-based intrusion prevention system (NIPS)Network-based intrusion detection systems (NIDSs) are designed to detect, log, and respond to unauthorized network or host use, both in real time and after the fact
(NIPS) has all the same characteristics as a NIDS but, unlike a NIDS, can automatically respond to certain events (for example, by resetting a TCP connection) without operator intervention
Network-based intrusion detection/prevention
What systems work by matching signatures in the network traffic stream to defined patterns stored in the system
The weakness of signature-based systems is that they rely on having accurate signature definitions beforehand, and as the number of signatures expand, this creates an issue in scalability.
Signature-based
The behavioral model relies on a collected set of “normal behavior”—what should happen on the network and is considered “normal” or “acceptable” traffic
This model can potentially detect zero-day or unpublished attacks but carries a high false-positive rate because any new traffic pattern can be labeled as “suspect
Heuristic/behavior
The IDS is first taught what “normal” traffic looks like and then looks for deviations from those “normal” patterns
An _____ is a deviation from an expected pattern or behavior
Anomaly
In-band solutions work great for protecting network segments that have high-value systems and a limited number of traffic types
An out-of-band system relies on a _____ sensor, or set of _____ sensors, and has the advantage of greater flexibility in detection across a wider range of traffic types-band solutions work great for protecting network segments that have high-value systems and a limited number of traffic types
An out-of-band system relies on a passive sensor, or set of passive sensors, and has the advantage of greater flexibility in detection across a wider range of traffic types
Inline vs. passive
is a device used to manage or store encryption keys. It can also assist in cryptographic operations such as encryption, hashing, or the application of digital signatures
A hardware security module (HSM)
are devices that capture data and act upon it. There are multiple kinds of sensors and various placement scenarios
Each type of sensor is different, and no single type of sensor can sense everything
Sensors
are sensors, or concentrators that combine multiple sensors, that collect data for processing by other systems
________ are subject to the same placement rules and limitations as sensor
Collectors
An _________ is a device that takes multiple inputs and combines them to a single output
These traffic management devices are located based on network layout topologies to limit unnecessary router usage
Aggregator
The heart of a ________ is the set of security policies that it enforces
Management determines what is allowed in the form of network traffic between devices, and these policies are used to build rulesets for the firewall devices used to filter network traffic across the network
Firewalls
is a device that performs restrictions based on rules associated with HTTP/HTTPS traffic
web application firewall (WAF)
can keep track of the state associated with a communication, and they can filter based on behaviors that are not properly associated with the state of the communication
Next-generation firewalls NGF
A ____ packet inspection firewall can act upon the state condition of a conversation
Stateful
The typical network firewall operates on IP addresses and ports, in essence a statelessinteraction with the traffic
The most basic firewalls simply shut off either ports or IP addresses, dropping those packets upon arrival
Stateless
is a marketing term used to describe all-in-one devices employed in network securityUTM devices typically provide a wide range of services, including switching, firewall, IDS/IPS, anti-malware, anti-spam, content filtering, and traffic shaping
Unified threat management (UTM)
To compensate for this lack of available IP address space, organizations use ____________ (NAT), which translates private (nonroutable) IP addresses into public (routable) IP addresse
Network address translation (NAT) gateway
_______ firewalls are exemplified by iptables, a built-in functionality in Linux system
Open-source vs. proprietary
Firewalls can be physical devices, hardware, or a set of software services running on a system.
Hardware vs. software
Firewalls can be located on a host, either as a separate application or part of the operating system itselfIn software-defined networking (SDN) networks, firewalls can be instantiated as virtual network functions, providing all of the features under a virtual software solution
Appliance vs. host-based vs. virtual
What lists provide the system information as to what objects are permitted which actions. ACLs can control who gets to change the network parameters via configurations, who gets to pass specific firewalls, and a host of other decisions
Access control list (ACL)Access controls
Depending on where the source and destination are with respect to each other, the route a packet takes can be wideranging, from simple and short to complex and long
Route security
is the use of specific technologies on a network to guarantee its ability to manage traffic based on a variety of indicators
Quality of service (QoS)
has many implications for secure network designs—some good, some problematic. ____ enables end-to-end encryption, which is great for communication security
Implications of IPv6
What can have issues when traffic levels get heavy as the aggregate SPAN traffic can exceed the throughput of the device
Port spanning/port mirroring