Module 25 Network Security Data Flashcards
What are some network security monitoring tools?
Snort, Sguil
What is an example of a network IDS?
Snort
What is alert data?
Messages generated by intrusion prevention systems or intrusion detection systems in response to traffic that violates a rule or matches a signature of an exploit
How are alerts generated?
Generated by Snort (NIDS), and made readable by Sguil and Squert applications.
How is session data recorded?
Record of a conversation between two end points.
Within this recorded data, what are the five tuples?
Source/Destination IP, Source/Destination port and the IP code for protocol in use
Why are packet captures important?
Contains the actual content of conversations, text of email messages, the HTML in web pages and the files that enter or leave the network.
How do we collect statistical data?
Cisco Cognitive Threat Analysis - finds malicious activity that has bypassed security controls by identifying traffic patterns.
What are some types of host logs
HIDS - event viewer - application logs, system logs, setup logs, security logs and command-line logs.
What is a system log?
These include events regarding the operation of drivers, processes and hardware
What is a setup log?
Installation of software, including windows updates
What is a security log?
These record events related to security, logon attempts and operations related to file or object management and access
What are application logs?
These contain events logged by various applications
What are command-line logs?
Attackers who have gained access, execute commands from the CLI rather than GUI.
What are some type of host logs? Event types
Error, Warning, Information, Success Audit, Failure Audit
What is a warning log?
Not necessarily significant but may indicate a future problem.
What is an error log
Event that indicates a significant problem such as loss of data or functionality.
What is an information log
Describes successful operation of an app, driver or service
How many distinct parts of a syslog message
3 - priority, header and msg
Describe the priority part of the syslog message
Two elements - Severity and Facility. Severity is a value (0-7), facility consists of sources that generated the message