Lecture 7 Flashcards

1
Q

?

is a type of attack on information assets in which the instigator attempts to gain entry into a system or disrupt the normal operation of system with, almost always, the intent to do malicious harm.

Identify

A

Intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

?

activities that deter an intrusion

Identify

A

Intrusion prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

?

procedures and systems that identify sys intrusions

Identify

A

Intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

?

Activities finalize the restoration of operations to a normal state

Identify

1/2 ?

A

Intrusion correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

?

Activities seek to identify the source & method of attack for prevention

Identify

2/2 ?

A

Intrusion correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

?

Intrusion prevention systems

Identify

Intrusion Detection Systems

A

Extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

?

: indication that attack is happening

Identify

IDPS Terminology

A

Alarm or alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

?

: attacker change the format and/or timing of activities to avoid being detected

Identify

IDPS Terminology

A

Evasion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

?

: event triggers alarm – no real attack

Identify

IDPS Terminology

A

False attack stimulus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

?

: failure of IDPS to react to attack

Identify

IDPS Terminology

A

False negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

?

: alarm activates in the absence of an actual attack

Identify

IDPS Terminology

A

False positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

?

: alarms events that are accurate but do not pose threats

Identify

IDPS Terminology

A

Noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

?

: rules & configuration guidelines governing the implementation & operation of IDPS

Identify

IDPS Terminology

A

Site policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

?

: ability to dynamically modify config in response to environmental activity

Identify

IDPS Terminology

A

Site policy awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

?

: event that triggers alarms in event of real attack

Identify

IDPS Terminology

A

True attack stimulus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

?

: adjusting an IDPS

Identify

IDPS Terminology

A

Tuning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

?

: measure IDPS ability correctly detect & identify type of attacks

Identify

IDPS Terminology

A

Confidence value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

?

: Classification of IDPS alerts

Identify

IDPS Terminology

A

Alarm filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

?

: grouping almost identical alarms happening at close to the same time

Identify

IDPS Terminology

A

Alarm clustering and compaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

?

Prevent problem behaviors by increasing the perceived risk of discovery and punishment

Identify

1/6 ?

A

IDS (Intrusion Detection Systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

?

Detect attacks and other security violations

Identify

2/6 ?

A

IDS (Intrusion Detection Systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

?

Detect and deal with preambles to attacks

Identify

3/6 ?

A

IDS (Intrusion Detection Systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

?

Document existing threat to an organization

Identify

4/6 ?

A

IDS (Intrusion Detection Systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

?

Act as quality control for security design & administration

Identify

5/6 ?

A

IDS (Intrusion Detection Systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

?

Provide useful information about intrusions that take place

Identify

6/6 ?

A

IDS (Intrusion Detection Systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

? ??

(2) Types of IDS

Enumerate

A
  • Network based
  • Hot-based
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

?

  • Focused on protection network information assets
  • Wireless
  • Network behavior analysis

Identify

1/2 Types of IDS

A

Network based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

?

Focused on protection server of host’s information assets

Identify

2/2 Types of IDS

A

Host-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

?

Resides on computer or appliance connected to an a segment of orgs. network

Identify

Types of IDS - 1/6 ?

A

Network-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

?

Monitors network traffic on the segment

Identify

Types of IDS - 2/6 ?

A

Network-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

?

Monitors packets

Identify

Types of IDS - 3/6 ?

A

Network-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

?

Monitoring port (switched port analysis)

Identify

Types of IDS - 4/6 ?

A

Network-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

?

Looks for attack patterns

Identify

Types of IDS - 5/6 ?

A

Network-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

?

Compares measured activity to known signatures

Identify

Types of IDS - 6/6 ?

A

Network-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

?

packet structure

Identify

Types of IDS - Compares measured activity to known signatures - 1/2 ?

A

Protocol verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

?

packet use

Identify

Types of IDS - Compares measured activity to known signatures - 1/2 ?

A

Application verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

? ??

(2) Forms of attack that are not easily discerned

Enumerate

A
  • Fragmented packets
  • Malformed packets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

?

Monitors and analyzes wireless network traffic

Identify

1/3 ?

A

Wireless NIDPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

?

Looks for potential problems with the wireless protocols

Identify

2/3 ?

A

Wireless NIDPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

?

Cannot evaluate & diagnose issue with higher level layers

Identify

3/3 ?

A

Wireless NIDPS

41
Q

? ?? ??? ???? ?????

(5) Issues associated with implementation

Enumerate

Wireless NIDPS

A
  • Physical security
  • Sensor range
  • Access point and wireless switch locations
  • Wired network connections
  • Cost
42
Q

?

Resides on a particular computer or server & monitors traffic only on that system

Identify

Types of IDS - 1/6 ?

A

Host-Based

43
Q

?

Resides on a particular computer or server & monitors traffic only on that system

Identify

Types of IDS - 1/6 ?

A

Host-Based

44
Q

?

Also known as system integrity verifiers

Identify

Types of IDS - 2/6 ?

A

Host-Based

45
Q

?

Works on principle of configuration and change management

Identify

Types of IDS - 3/6 ?

A

Host-Based

46
Q

?

Classifies files in categories & applies various notification actions based on rules

Identify

Types of IDS - 4/6 ?

A

Host-Based

47
Q

?

Maintains own log file

Identify

Types of IDS - 5/6 ?

A

Host-Based

48
Q

?

Can monitor multiple computers simultaneously

Identify

Types of IDS - 6/6 ?

A

Host-Based

49
Q

?

Examines application for abnormal events

Identify

1/5 ?

A

Application Based

50
Q

?

Tracks interaction between users and applications

Identify

2/5 ?

A

Application Based

51
Q

?

Able to tract specific activity back to individual user

Identify

3/5 ?

A

Application Based

52
Q

?

Able to view encrypted data

Identify

4/5 ?

A

Application Based

53
Q

?

Can examine encryption/decryption process

Identify

5/5 ?

A

Application Based

54
Q

?

Two dominate methodologies

Identify

IDS Methodologies

A
  • Signature-based (knowledge-based)
  • Statistical-anomaly approach
55
Q

?

  • Examines data traffic in search of patterns that match known signature
  • Widely used
  • Signature database must be continually updated
  • Attack time-frame sometimes problematic

Identify

1/2 IDS Methodologies

A

Signature Based

56
Q

?

Based on frequency on which network activities take place

Identify

2/2 IDS Methodologies 1/7 ?

A

Statistical Anomaly Based

57
Q

?

Collect statistical summaries of “normal” traffic to form baseline

Identify

2/2 IDS Methodologies 2/7 ?

A

Statistical Anomaly Based

58
Q

?

Measure current traffic against baseline

Identify

2/2 IDS Methodologies 3/7 ?

A

Statistical Anomaly Based

59
Q

?

Traffic outside baseline will generate alert

Identify

2/2 IDS Methodologies 4/7 ?

A

Statistical Anomaly Based

60
Q

?

Can detect new type of attacks

Identify

2/2 IDS Methodologies 5/7 ?

A

Statistical Anomaly Based

61
Q

?

Requires much more overhead and processing capacity

Identify

2/2 IDS Methodologies 6/7 ?

A

Statistical Anomaly Based

62
Q

?

May not detect minor changes to baseline

Identify

2/2 IDS Methodologies 7/7 ?

A

Statistical Anomaly Based

63
Q

?

Similar to NIDS

Identify

1/5 ?

A

Log file Monitors

64
Q

?

Reviews logs

Identify

2/5 ?

A

Log file Monitors

65
Q

?

Looks for patterns & signatures in log files

Identify

3/5 ?

A

Log file Monitors

66
Q

?

Able to look at multiple log files from different systems

Identify

4/5 ?

A

Log file Monitors

67
Q

?

Large storage requirement

Identify

5/5 ?

A

Log file Monitors

68
Q

?

Vary according to organization policy, objectives, and system capabilities

Identify

1/3 ?

A

Responses to IDS

69
Q

?

Administrator must be careful not to increase the problem

Identify

2/3 ?

A

Responses to IDS

70
Q

?

Responses active or passive

Identify

3/3 ?

A

Responses to IDS

71
Q

? ?? ???

(3) Control Strategies

Enumerate

A
  • Centralized
  • Partially distributed
  • Fully distributed
72
Q

?

  • All IDS control functions are implemented and managed in a centralized location
  • 1 management system

Identify

1/3 Control Strategies

A

Centralized

73
Q

?

Opposite of centralized

Identify

2/3 Control Strategies 1/3 ?

A

Fully Distributed

74
Q

?

All control functions applied at the physical location of each IDS component

Identify

2/3 Control Strategies 2/3 ?

A

Fully Distributed

75
Q

?

  • Each sensor/agent is best configured to deal with its own environment
  • Reaction to attacks sped up

Identify

2/3 Control Strategies 3/3 ?

A

Fully Distributed

76
Q

?

Individual agents respond to local threats

Identify

3/3 Control Strategies 1/3 ?

A

Partially Distributed Control

77
Q

?

Report to a hierarchical central facility

Identify

3/3 Control Strategies 2/3 ?

A

Partially Distributed Control

78
Q

?

One of the more effective methods

Identify

3/3 Control Strategies 3/3 ?

A

Partially Distributed Control

79
Q

?

Decoy systems

Identify

1/3 ?

A

Honey Pots

80
Q

?

Lure potential attackers away from critical systems

Identify

2/3 ?

A

Honey Pots

81
Q

?

Encourages attacks against themselves

Identify

3/3 ?

A

Honey Pots

82
Q

?

Collection of honey pots

Identify

1/4 ?

A

Honey Net

83
Q

?

Connects honey pots on a subnet

Identify

2/4 ?

A

Honey Net

84
Q

?

Contains pseudo-services the emulated well-known services

Identify

3/4 ?

A

Honey Net

85
Q

?

Filled with factious information

Identify

4/4 ?

A

Honey Net

86
Q

?

Protected honey pot

Identify

1/3 ?

A

Padded Cell

87
Q

?

IDS detects attacks and transfers to simulated environment

Identify

2/3 ?

A

Padded Cell

88
Q

?

Monitors action of attacker

Identify

3/3 ?

A

Padded Cell

89
Q

?

Detect intrusion and trace incident back

Identify

1/3 ?

A

Trap and Trace Systems

90
Q

?

Consist of honey pot or padded cell & alarm

Identify

2/3 ?

A

Trap and Trace Systems

91
Q

?

Similar to concept of caller ID

Identify

3/3 ?

A

Trap and Trace Systems

92
Q

?

Considered unethical

Identify

Trap and Trace Systems

A

Back-hack

93
Q

?

Legal drawbacks to trap and trace

Identify

Trap and Trace Systems

A

Enticement and entrapment

94
Q

?

Help find vulnerabilities in system, holes in security components, and unsecure aspects of the network

Identify

1/3 ?

A

Scanning and Analysis Tools

95
Q

?

Allow system admin to see what the attacker sees

Identify

2/3 ?

A

Scanning and Analysis Tools

96
Q

?

May run into problems with ISP

Identify

3/3 ?

A

Scanning and Analysis Tools

97
Q

? ?? ??? ???? ?????

(5) Scanning and Analysis Tools

Enumerate

Scanning and Analysis Tools

A
  • Port scanners
  • Firewall analysis tools
  • Operating system detection tools
  • Vulnerability scanners
  • Packet sniffers
98
Q

?

– validation of users identity

Identify

Access Control Tools

A

Authentication

99
Q

? ?? ??? ????

4 general ways carried out

Enumerate

Access Control Tools

A
  • What he knows
  • What he has
  • Who he is
  • What he produces