Lecture 7 Flashcards
?
is a type of attack on information assets in which the instigator attempts to gain entry into a system or disrupt the normal operation of system with, almost always, the intent to do malicious harm.
Identify
Intrusion
?
activities that deter an intrusion
Identify
Intrusion prevention
?
procedures and systems that identify sys intrusions
Identify
Intrusion detection
?
Activities finalize the restoration of operations to a normal state
Identify
1/2 ?
Intrusion correction
?
Activities seek to identify the source & method of attack for prevention
Identify
2/2 ?
Intrusion correction
?
Intrusion prevention systems
Identify
Intrusion Detection Systems
Extension
?
: indication that attack is happening
Identify
IDPS Terminology
Alarm or alert
?
: attacker change the format and/or timing of activities to avoid being detected
Identify
IDPS Terminology
Evasion
?
: event triggers alarm – no real attack
Identify
IDPS Terminology
False attack stimulus
?
: failure of IDPS to react to attack
Identify
IDPS Terminology
False negative
?
: alarm activates in the absence of an actual attack
Identify
IDPS Terminology
False positive
?
: alarms events that are accurate but do not pose threats
Identify
IDPS Terminology
Noise
?
: rules & configuration guidelines governing the implementation & operation of IDPS
Identify
IDPS Terminology
Site policy
?
: ability to dynamically modify config in response to environmental activity
Identify
IDPS Terminology
Site policy awareness
?
: event that triggers alarms in event of real attack
Identify
IDPS Terminology
True attack stimulus
?
: adjusting an IDPS
Identify
IDPS Terminology
Tuning
?
: measure IDPS ability correctly detect & identify type of attacks
Identify
IDPS Terminology
Confidence value
?
: Classification of IDPS alerts
Identify
IDPS Terminology
Alarm filtering
?
: grouping almost identical alarms happening at close to the same time
Identify
IDPS Terminology
Alarm clustering and compaction
?
Prevent problem behaviors by increasing the perceived risk of discovery and punishment
Identify
1/6 ?
IDS (Intrusion Detection Systems)
?
Detect attacks and other security violations
Identify
2/6 ?
IDS (Intrusion Detection Systems)
?
Detect and deal with preambles to attacks
Identify
3/6 ?
IDS (Intrusion Detection Systems)
?
Document existing threat to an organization
Identify
4/6 ?
IDS (Intrusion Detection Systems)
?
Act as quality control for security design & administration
Identify
5/6 ?
IDS (Intrusion Detection Systems)
?
Provide useful information about intrusions that take place
Identify
6/6 ?
IDS (Intrusion Detection Systems)
? ??
(2) Types of IDS
Enumerate
- Network based
- Hot-based
?
- Focused on protection network information assets
- Wireless
- Network behavior analysis
Identify
1/2 Types of IDS
Network based
?
Focused on protection server of host’s information assets
Identify
2/2 Types of IDS
Host-based
?
Resides on computer or appliance connected to an a segment of orgs. network
Identify
Types of IDS - 1/6 ?
Network-Based
?
Monitors network traffic on the segment
Identify
Types of IDS - 2/6 ?
Network-Based
?
Monitors packets
Identify
Types of IDS - 3/6 ?
Network-Based
?
Monitoring port (switched port analysis)
Identify
Types of IDS - 4/6 ?
Network-Based
?
Looks for attack patterns
Identify
Types of IDS - 5/6 ?
Network-Based
?
Compares measured activity to known signatures
Identify
Types of IDS - 6/6 ?
Network-Based
?
packet structure
Identify
Types of IDS - Compares measured activity to known signatures - 1/2 ?
Protocol verification
?
packet use
Identify
Types of IDS - Compares measured activity to known signatures - 1/2 ?
Application verification
? ??
(2) Forms of attack that are not easily discerned
Enumerate
- Fragmented packets
- Malformed packets
?
Monitors and analyzes wireless network traffic
Identify
1/3 ?
Wireless NIDPS
?
Looks for potential problems with the wireless protocols
Identify
2/3 ?
Wireless NIDPS