Lesson 6 Flashcards

1
Q

Attempts to gain entry to a system.

A

Intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Activities that deter intrusion.

A

Intrusion Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Procedures, detect system intrusions.

A

Intrusion Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Actions when an intrusion occurs.

A

Intrusion Reaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Restoration of operations.

A

Intrusion Correction Activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

– detect violations and activate the alarm.
– notify administrators of trouble.
– notify external security services.

A

Intrusion Detection & Prevention Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDPS Terminologies (12)

A

Site Policy Awareness
Tuning
True Attack Stimulus
Confidence Value
Alarm Filtering
Alarm Clustering & Compaction
Alert/Alarm
Evasion
False Attack Stimulus
False Negative & False Positive
Noise
Site Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

– protecting network information assets.
– connected to a segment of a network.
– looks for attack patterns in packets.
– installed where it can watch traffic.
– done through special TCP/IP stacks (where data packets are invalid or used improperly).

A

Network-based IDPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For wireless networks.
Ex. physical security, sensor range, switch

A

Wireless IDPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examines traffic flow, abnormal patterns.
Ex. DoS, scanning, worms, violations

A

Network Behavior Analysis IDPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advantages of NIDPS (3)

A

Can use devices to monitor larger networks, passive and can be deployed into existing networks, not susceptible and detectable by attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disadvantages of NIDPS (5)

A

Can be overwhelmed by network volume, require access to all traffic, cannot analyze encrypted packets, cannot ascertain if an attack is successful, bad for fragmented packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Disadvantages of NIDPS (4)

A

Can be overwhelmed by network volume, require access to all traffic, cannot analyze encrypted packets, cannot ascertain if an attack is successful, bad for fragmented packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

– resides on a server.
– benchmark and monitor key files.
– detects intruders modifying files.
– principle of configuration.
– change management.

A

Host-based IDPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

– resides on a server.
– benchmark and monitor key files.
– detects intruders modifying files.
– principle of configuration.
– change management.

A

Host-based IDPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advantages of HIDPS (6)

A

installed, access encrypted network, detect local events, functions on host systems where traffic is decrypted, not affected by switch networks, detect inconsistencies through audit logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disadvantages of HIDPS (5)

A

Management issues, vulnerable to direct and host-targeted attacks, susceptible to DoS, large disk space, performance overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

– examine patterns that match signatures.
– attacks have distinct signatures.
– must be continuously updated.

A

Signature-based IDPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

– AKA stat IDPS or behavior-based IDPS.
– compare traffic known to be normal.
– baseline parameters/clipping level.
– can detect new attacks.
– requires more overhead.
– may generate false positives.

A

Statistical Anomaly-based IDPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

– stores relevant data involving multiple attack requests (detect multi-session attacks).
– analytical complexity, may fail to detect unless a protocol is violated.

A

Stateful Protocol Analysis IDPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Comparing predetermined profiles.

A

Stateful Protocol Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

– similar to NIDPS.
– reviews log files for patterns or signs.
– allocation of resources for log data.

A

Log File Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

– systems environment?
– security goals and objectives?
– existing security policy?

A

Technical Policy Considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

– required levied from the organization?
– resource constraints?

A

Organizational Requirements

25
Q

– sufficiently scalable?
– tested?
– user level of expertise?
– designed to evolve?
– support provisions?

A

IDPS Product Features & Quality

26
Q

Strengths of IDPS (10)

A

Analysis of system events, testing and baselining security states, tracking changes, recognizing attack patterns, recognizing activity patterns, managing OS audit, alerting staff, measuring enforcement of security policies, providing default info, allows non-security experts to perform functions.

27
Q

Limitations of IDPS (8)

A

cannot compensate for missing security mechanisms, detect attacks in heavy network load, detect new attacks, respond to sophisticated attacks, investigate without human intervention, resist attacks, compensate fidelity issues, deal with switched networks.

28
Q

Managed at a central location

A

Centralized

29
Q

Applied at the physical location.

A

Fully Distributed

30
Q

Combines the two, reports to a hierarchical central facility.

A

Partially Distributed

31
Q

Deploying NIDPS Locations (4)

A

Location 1: Behind each external firewall, in the network DMZ.
Location 2: Outside an external firewall.
Location 3: On major network backbones.
Location 4: On critical subnets.

32
Q

Deploying HIDPS (2)

A

– implementing most critical systems first.
– continues until all systems are installed.

33
Q

IDPS are measured using… (4)

A

…threshold, blacklists and whitelists, alert settings, and code viewing and editing.

34
Q

Decoy systems to lure attackers.

A

Honeypots

35
Q

Collection of honeypots on a subnet.

A

Honeynets

36
Q

– a protected honeypot.
– operates in tandem with an IDS.
– a simulated environment.

A

Padded Cell

37
Q

– detect intrusion and trace the source.
– consists of a honeypot and alarm.

A

Trap & Trace Systems

38
Q

Attracting attention by placing tantalizing bits of information.

A

Enticement

39
Q

luring someone to commit a crime.
– enticement = legal, _______ = illegal

A

Entrapment

40
Q

– active countermeasures to stop attacks.
Ex. LaBrea

A

Active Intrusion Prevention

41
Q

Collect information that an attacker would need to launch successful attacks.

A

Scanning & Analysis Tools

42
Q

Series of steps used by an attacker.

A

Attack Protocol

43
Q

Research of internet addresses

A

Footprinting

44
Q

Survey of internet addresses from footprinting, reveals internal structure.

A

Fingerprinting

45
Q

– tool used to identify active computers.
– can scan generic and specific types of computers or protocols.

A

Port Scanners

46
Q

– remote discovery of firewall rules.
– close an open firewall.

A

Firewall Analysis Tools

47
Q

– detecting a target’s operating system.
– networking protocols to determine OS.

A

Operating System Detection Tools

48
Q

Scan networks for highly-detailed information, initiate traffic.

A

Active Vulnerability Scanner

49
Q

Listen-in on networks, find client-side vulnerabilities.

A

Passive Vulnerability Scanner

50
Q

– collects copies of packets.
– diagnosing network issues.
– can be used to eavesdrop on traffic.

A

Packet Sniffers

51
Q

Sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network.

A

Wireless Security Tools

52
Q

To use packet sniffers legally, an administrator must… (3)

A

Be on a network that organization owns, be under direct authorization of the owner of the network, and have knowledge and consent of the content creators.

53
Q

– measurable human characteristics to authenticate identity of a prospective user (supplicant).
– recognition.
Ex. fingerprint comparison, palm print comparison, hand geometry, facial recognition, retinal print, iris pattern

A

Biometric Access Control

54
Q

The unique traits of humans include… (3)

A

fingerprints, retina, iris

55
Q

Rejection of legit users.

A

False Reject Rate

56
Q

Rejection of legit users.

A

False Reject Rate

57
Q

Acceptance of unknown users.

A

False Accept Rate

58
Q

Where false accept and false reject crosses when graphed.

A

Crossover Error Rate

59
Q

Validation of user (supplicant)’s identity.

A

Authentication