LO3.2 Flashcards
What is vulnerability testing?
Identifying a list of vulnerabilities that can be prioritised in order of severity
How may you identify vulnerabilities?
Penetration testing
Fuzzing
Security functionality
Sandboxing
Honeypotting
What is penetration testing?
An intentionally simulated attack performed by a professionall
What is fuzzing?
Inputting huge amounts of random data in an attempt to crash the system to identify coding errors
What is security functionality?
It identifies flaws in security mechanisms
What is sandboxing?
An environment that isolates untested code changes to ensure issues aren’t transmitted
What is honeypotting?
Setting up a computer system as a decoy to detect, deflect and counteract any unauthorised use of the system
What is the difference between anomaly and signature based?
Anomaly based identifies if activity is expected or not whereas signatured based monitors specific patterns for activity that aligns with sequences used by malware. This means that signatured based requires regular updates to upkeep with the times
What is an IDS (intrusion detection system)?
Device or software used to monitor systems for malicious activity
What are the three types of IDS (intrusion detection system)?
NIDS (Network Intrusion Detection System)
HIDS (Host Intrusion Detection System)
DIDS (Distributed Intrusion Detection System)
What does a NIDS (Network Intrusion Detection System) do?
Monitors all inbound and outbound network activity to identify any suspicious patterns that indicate a cyber attack
What does a HIDS (Host Intrusion Detection System) do?
Monitors inbound and outbound packets of a device for any suspicious activity
What does a DIDS (Distributed Intrusion Detection System) do?
Multiple IDS (intrusion detection systems) on a large network communicating with each other that provide a broad overview of network activity and facilitates fast analysis of any issues
What is an IPS (Intrusion Prevention System)?
Proactive detection and prevention against unwanted intruders
What’s an example of an IPS (Intrusion Prevention System)?
Firewall