network defense Flashcards
on a network device, default accounts and passwords should be
changed immediately
it allows a user to take advantage of a software bug to gain access to system resources that would typically not be available to the user
privilege escalation
an unprotected access method or pathway.
backdoor
a network device that detect attacks and suspicious activity.
intrusion detection system (IDS)
this variation of IDS monitors, logs, and detects security breaches but takes no action to stop or prevent the attack
passive IDS
this variation of IDS performs the functions of an IDS but can also react when security breaches occur.
active IDS
this IDS feature looks for patterns in network traffic and compares it to known attack patterns called
signature recognition
this IDS feature monitors traffic to define a standard activity pattern as “normal.”
anomaly recognition
a IDS is installed on a single host and monitors all traffic it coming in is called
host-based IDS
a IDS dedicated device installed on the network
network-based IDS
a device or virtual machine that entices intruders by displaying a vulnerable trait or flaw or by appearing to contain valuable data
honeypot
a network of honeypots.
honeynet
a honeypot that answers connection requests in such a way that the attacking computer is “stuck” for a period of time
tarpit
the objectives of using honeypots and tarpits are to
distract an attacker
and
observe the attackers
what is a SAN
storage area network