Securing Your Network Flashcards
Difference between IDS and IPS
IDS - identify threats and provides alerts
IPS - Identify threats and reacts to threats
Difference between HIDS and NIDS
HIDS - host based and traffics goes through a NIC
NIDS - Network based
The two types of detection methods used in IDS
Signature-based aka definition
Heuristic / behavioral based aka anomaly
The difference between SYN flood guard and flood guard on a switch
SYN Flood guard - Usually included in firewalls
Flood Guard on switch - Used to prevent MAC flood attacks.
Difference between false positives and false negatives in regards to IDS
False Positive - An alarm or alert on an event that is non-threatening.
False Negative - When an attack is occurring but the IDS does not identify the threat.
What is the threshold range of IDS. What is the result of the threshold being to low or to high
1 to 1000.
Too Low - IDS will raise too many alerts on events that are legitimate.
Too High - IDS will fail to identify threats
Intrusion system that is in-line aka in-band
IPS
Intrusion system that collects data passively or out-of-band
IDS
Intrusion system that have protocol analyzer capabilities
Both IDS and IPS
What is the disadvantage of an active NIDS
It blocks an attack only after the attack has started
Hardware devices that focus on handling TLS traffic. Allows systems to off-load encryption workload to a separate hardware device to alleviate stress on computer resources.
SSL/TLS Accelerator
Used in conjunction with NIPS to mitigate threats that use encryption technologies.
SSL Decryptors
It uses virtualization technologies to separate data and control planes within a network. Commonly used with ABAC.
SDN - Software Defined Network
A port based authentication protocol that authenticates prior to granting access to a network
IEEE 802.1x
Methods used to authenticate VPN clients before they connect
Implement IEEE 802.1x as Remote Authentication Dial-In User Service (RADIUS) or Diameter Server
The two distinctions of wireless AP
- All wireless routers are AP’s
- Not all AP’s are wireless routers
A stand alone, intelligent, or autonomous AP, includes everything needed to connect wireless clients to a wireless network
Fat AP
Is not a stand alone AP
Thin AP or controller-based AP
This identified an AP or wireless network
SSID - Service Set Identifier
Disabling SSID is a sure way to deny an attacker from finding a network. True or False
False. Makes it more difficult but an attacker can find it.
How would an attacker over-ride MAC Filtering.
An attacker could sniff an allowed mac address and spoof the address.
A strong security protocol for wireless networks
WPA2
What is the replacement for WPA
WPA2 aka 802.11i