Lecture 10 Flashcards

1
Q

What is a security intrusion?

A

A security event where an intruder gains or attempts to gain unauthorized access to a system or resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is intrusion detection?

A

A service that monitors and analyzes system events to provide real-time warnings of unauthorized access attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three main components of an IDS?

A

Sensors, Analyzers, and User Interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Host-based IDS (HIDS)?

A

An IDS that monitors and analyzes the internals of a computing system and its network interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Network-based IDS (NIDS)?

A

An IDS that monitors and analyzes network traffic at selected points in real or near-real time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Distributed or Hybrid IDS?

A

An IDS that combines information from multiple sensors across a cooperative system design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the base-rate fallacy in intrusion detection?

A

The difficulty of distinguishing between legitimate and malicious users due to class imbalance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is signature-based detection?

A

Detection using known malicious data patterns (signatures) or attack rules; identifies known attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is anomaly detection?

A

Detection based on deviations from established legitimate user behavior; identifies unknown or zero-day attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are three methods for developing IDS?

A

Statistical analysis, Knowledge-based (expert systems), and Machine learning techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SNORT?

A

A rule-based HIDS/NIDS system for intrusion detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples of activities monitored by HIDS?

A

Changes to system registry, failed login attempts, critical system file changes, and backdoor installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are drawbacks of HIDS?

A

Resource consumption, tampering risk, false alarms, and management difficulties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a honeypot?

A

A decoy system designed to lure attackers away from critical systems and collect information about attack strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the types of honeypots?

A

Low-interaction and High-interaction honeypots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a firewall?

A

A network security system that monitors and controls incoming and outgoing network traffic based on security rules.

17
Q

Advantages of using a firewall?

A

Keeps unauthorized users out, protects against vulnerable services, IP spoofing, monitors events, supports VPNs.

18
Q

Disadvantages of using a firewall?

A

Cannot protect against internal threats or attacks bypassing the firewall.

19
Q

What is a packet filtering firewall?

A

Applies rules to incoming/outgoing IP packets based on header information to forward or discard packets.

20
Q

What are weaknesses of packet filtering firewalls?

A

Limited application layer protection, limited logging, vulnerable to TCP/IP exploits, configuration mistakes.

21
Q

What is a stateful inspection firewall?

A

Maintains records of active connections and makes decisions based on connection state and packet information.

22
Q

What is an application proxy firewall?

A

Acts as a relay of application-level traffic, requiring a proxy for each application supported.

23
Q

Where can firewalls be based?

A

Standalone machine, router, LAN switch, or server.

24
Q

What is a host-based firewall?

A

A software module that secures an individual host, often tailored to the host’s environment.

25
What is a distributed firewall?
Uses host-based firewalls and stand-alone devices under central control for broad and specific protection.
26
What is an Intrusion Prevention System (IPS)?
An extension of IDS that attempts to block or prevent detected malicious activities.
27
What are types of IPS?
Host-based IPS (HIPS), Network-based IPS (NIPS), and Distributed/Hybrid IPS.
28
Examples of malicious activities prevented by HIPS?
Rootkits, privilege escalation, buffer overflow exploits, access to email contacts, directory traversal.
29
What is the difference between IDS and IPS?
IDS detects and alerts on intrusions; IPS detects and actively blocks or prevents intrusions.