Objective 6a Flashcards
Monitors network traffic and changes to computer settings to detect patterns indicating known intrusion attempts
Intrusion Detection
System scanning, auditing, and monitoring security infrastructure for signs of attacks in progress
Intrusion Detection System
Blocks network traffic when it detects intrusion
Active IDS (Also known as Intrusion Prevention System, IPS)
Monitors network traffic and only alerts administrator about suspicious traffic
Passive IDS
Examines network traffic for suspicious patterns
Network-Based IDS
Examines servers or client computers for patterns of an intrusion
Host-Based IDS
When shows of an attack has happened but triggered by normal traffic or results from misconfigured equipment
False Positive
Provides insight to what may be happening on network and systems
Passive IDS
Allows administrators to see misuse occurring within system itself
Host Based Intrusion Detection System (HIDS)
Primarily uses passive hardware sensors to monitor traffic on specific segment of network
Network Based Intrusion Detection System (NIDS)
Look for specific groupings of characters common in known attacks
String Signatures
Watch for connection attempts to well-known, frequently attacked ports
Port Signatures
Watch for dangerous or illogical combinations in packet headers
Header Signatures