Lecture 10 Flashcards

1
Q

What is IDS?

A

Intrusion Detection System - detects attacks and alerts.

IDS is essential for identifying potential security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is IPS?

A

Intrusion Prevention System - detects and blocks attacks.

IPS actively prevents intrusions rather than just alerting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is signature-based detection?

A

Detects attacks using known patterns.

This method relies on pre-defined signatures of known threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is anomaly-based detection?

A

Detects unusual behavior by comparing to normal.

This approach identifies deviations from established baselines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a false positive?

A

Legitimate behavior incorrectly flagged as malicious.

False positives can lead to unnecessary alerts and resource allocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a false negative?

A

A real attack that goes undetected.

False negatives pose significant security risks since they allow breaches to occur unnoticed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is HIDS?

A

Host-based IDS - runs on a single host.

HIDS monitors the inbound and outbound packets from the device only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is NIDS?

A

Network-based IDS - monitors traffic across the network.

NIDS analyzes traffic across multiple devices in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of logging in IDS?

A

Provides data for attack analysis.

Logging is crucial for post-attack forensic analysis and understanding attack vectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is real-time monitoring?

A

Continuous system monitoring as it operates.

Real-time monitoring enables immediate detection and response to threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Snort?

A

Popular open-source IDS tool.

Snort is widely used due to its flexibility and community support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the goal of IDPS?

A

Detect and minimize the impact of intrusions.

IDPS aims to enhance security posture by identifying and mitigating threats promptly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly