IDS and IPSec Flashcards
What is an intrusion detection system?
A system’s second line of defense that monitors events and analyzes them for signs of intrusions.
Intrusions are defined as attempts to compromise confidentiality, integrity, or availability.
What is the primary function of a firewall?
Perimeter security by deciding which packets are allowed or denied, and which must be modified before passing.
What is a limitation of firewalls?
Cannot detect security breaches associated with traffic that does not pass through it.
What is an insider attack?
The most difficult type of attack to detect and prevent, often motivated by revenge or a feeling of entitlement.
Define masquerader.
An unauthorized user who penetrates a system’s access controls to exploit a legitimate user’s privileges.
Define misfeasor.
A legitimate user who is authorized for access but misuses their privileges.
What is a clandestine user?
An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls.
What are common behaviors of hackers?
- Map network for accessible services
- Identify potentially vulnerable services
- Use brute force methods
- Install remote administration tools
What does an intrusion detection system (IDS) enable?
Collection of information about intrusion techniques that can be used to strengthen intrusion prevention measures.
What are false positives in intrusion detection?
An intrusion is reported when none has actually occurred.
What are false negatives in intrusion detection?
Fails to identify an actual intrusion when one has occurred.
What is a true positive in the context of IDS?
An event the IDS accurately identifies as an intrusion.
What is the goal of an effective IDS?
- Maximize true positives
- Minimize false positives and false negatives
- Minimize time spent verifying attacks
What is a host-based IDS (HIDS)?
Monitors single host activity, detects intrusions, logs suspicious events, and sends alerts.
What is signature/misuse detection?
Detection method that compares known malicious data patterns with current behavior.
What is rule-based anomaly detection?
Analyzes historical audit records to identify usage patterns and generate rules that describe those patterns.
What is an anomalous behavior?
Anything that deviates from the baseline of normal behavior will be flagged and logged as anomalous.
What is statistical anomaly detection?
Collection of data relating to the behavior of legitimate users over time to identify illegitimate behavior.
What is the base-rate fallacy in IDS?
An IDS should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level.
What does a network-based IDS (NIDS) monitor?
Network traffic at selected points, examining the traffic packet by packet in real time.
What is a honeypot?
Decoy systems designed to lure potential attackers and collect information about their activity.
What is the difference between low interaction and high interaction honeypots?
- Low interaction: Emulates specific IT services
- High interaction: A real system with a full operating system and applications
What is Snort?
A lightweight IDS that can function as a packet sniffer and network intrusion detection system.
What are the two protocols used in IPSec?
- Authentication Header (AH)
- Encapsulation Security Protocol (ESP)