MODULE 7 Flashcards

1
Q

Intruder behavior steps:

A
  1. Target acquisition
  2. Initial access
  3. Privilege escalation
  4. System exploit
  5. Maintaining access
  6. Covering tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Initial attacks often exploit system vulnerabilities to:

A
  • Execute backdoor code
  • Gain protected information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDS types:

A
  • Host-based
  • Network-based
  • Distributed or hybrid
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Requirements of IDS

A
  • Fault tolerant
  • Minimal overhead
  • Graceful degradation
  • Adapt to changes
  • Run continually
  • Dynamic reconfiguration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Intrusion detection problems:

A
  • False positives
  • False negatives
  • Must compromise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDS analysis approaches:

A
  • Anomaly detection
  • Signature/Heuristic/Misuse detection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDS signature detection:

A

Matching malicious data patterns against stored data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDS heuristic detection:

A

Using rules to identify penetrations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HIDS sensor:

A

A component of intrusion detection used to collect data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information logged by an NIDS sensor:

A
  • Timestamp
  • Event
  • IP addresses
  • Ports
  • Protocols
  • Number of bytes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIDS sensor types:

A
  • Inline
  • Passive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Honeypots:

A

Decoys with fake info to lure attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Snort IDS:

A

Lightweight open-source IDS that captures packets and analyze them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Snort rules:

A
  • Simple rule definition language
  • Fixed header
  • Header includes action, protocol, source IP, source port, direction, destination IP, and destination port
  • Many options possible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly