Network Security Flashcards

1
Q

What’s the difference between an IDS and an IPS in terms of taking action?

A

IDS tools don’t take action on their own.

IPS control system accepts and rejects a packet based on the rule set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What three logical components make up an Intrusion Detection System?

A

Sensors: software and/or data sources that collect data.

Analysers: determines if intrusion has occurred.

User interface: views output or controls system behaviour.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an NIDS?

How does it work and where is analysis of traffic patterns performed?

A

Network-based Intrusion Detection System.

Monitors network traffic and analyses network, transport, application protocols to identify suspicious activity.

Works by monitoring traffic at selected points on a network, it examines traffic packet by packet in real or close to real time.

Analysis of traffic may be done at the sensor, the management server, or a combination of the two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a HIDS?

A

Host-based Intrusion Detection System

It monitors the characteristics of a single host for suspicious activity, such as on a PC, phone or tablet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s a honeypot and what’s it used for?

A

Decoy systems that can be fake services, databases or networks.

Filled with fabricated information and have no real production value.

Designed to lure a potential attacker away from critical systems
Collect info about the attacker’s activity
Encourage attacker to stay on system long enough for administrators to respond.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is a firewall an IDS or an IPS and where is it inserted?

A

IPS - Intrusion Prevention System

Inserted between the premises network and the internet to establish a controlled link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two capabilities and four limitations of a firewall?

A
  1. Defines a single choke point.
  2. Provides a location for monitoring security events.

-

  1. Cannot protect against attacks bypassing firewall.
  2. May not fully protect against internal threats.
  3. Improperly secured wireless LANs can be accessed from outside organisation.
  4. A laptop, PDA or portable storage devices may be infected outside the network then used internally.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Do client attacks require access to the remote host?

Give an example of a client attack.

A

No, the adversary attempts to achieve user authentication without access to the remote host or the intervening communications path.

Such as password guessing/cracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An IDS is composed of three logical components, what are they?

A
  1. Sensors - software/data sources that collect data. Common sources are system call traces, audit records, file integrity checksums, registry access.
  2. Analysers - determines if intrusion has occurred.
  3. User interface - views output or controls system behaviour.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a Distributed or Hybrid IDS work?

A

Combines information from sensors, both host and network based, in a central analyser.

They’re able to better identify and respond to intrusion activity.

Stores information with logs and analyses using algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly