Module 5: Handling Network Security Incident Flashcards
What is a denial-of-service attack (DoS)
A network security incident where intended authorized users are prevented from using system, network, or applications.
TRUE or FALSE: Physically damaging the cables and other resources are a form of DoS
TRUE
It prevents authorized users from using the network
What is the difference between DDoS and DoS attacks
DDoS is where a single system is attacked by a large number of infected machines over the Internet. DoS is normally done by a single machine flooding the network
What are the two steps in performing a DDoS attack
- Building an attack network (Getting zombies)
* Launching attack on a target system (Using malicious programs in infected systems)
How can you tell if a DoS attack is occuring to a host or network service
- User reports system unavailability
- Undefined connection loss
- Alerts from NIDS & HIDS
- Increased network bandwidth
- A host having a number of connections
- Asymmetric network traffic pattern
- Unprecedented log entries of firewall and router
- Data packets with abnormal source addresses
How can Internet Service Provider (ISP) be used to help handling network based DoS attacks
ISP’s maintain traffic logs and after checking the logs during the DoS they can trace the source of attack
TRUE or FALSE: There is a foolproof solution against DoS attack.
FALSE
What are the major DoS response strategies
- Absorb the attack
- Degrade services
- Shut down the services
What steps can you use to prevent a DoS incident
- Configuring firewall rules to block traffic
- Filter ICMP traffic
- Block the non-critical services such as echo
- Close unnecessary ports
- Block unassigned IP address ranges
TRUE or FALSE: It is generally not possible to prevent DoS by blocking a few source IP addresses.
TRUE
What is classified as unauthorized access incidents
Gaining of illegal access to resources without authorization
How do attackers gain unauthorized access
- Exploiting vulnerabilities in OS or software application
- Steal user authentication credentials
- Using social engineering tricks
- Insider threats
Which team do you need to discuss with should an unauthorized access incident happens
The Network Security Admins
What needs to happen to the passwords in the event of an unauthorized access incident
The passwords need to change
To help with network security what might help prevent an unauthorized access incident
- Arrange network to block suspicious traffic
- Secure all the remote access
- Put any public service in a DMZ
- Use private IP addresses for internal use