Security applpications and Devices Flashcards
personal firewalls
software application that protects a sing computer
intrusion detection system
software app or device monitors system or network to find and incident or attack
HIDS
Host intrustion detection system
software logs things it thinks is suspesious
NIDS
Networkwork based IDS
Hardware that detects and logs incidents or attackers
signature-based detection method
specific string of bytes triggers an alert
policy-based detection method
relies on specific declaration of the security policy
anomaly -based detetion method
analyzes traffic patterns
True positive alert
Malicious activity is id as attack
True negative
legit activity is id as legit traffic
False positive
legitimate active is flagged
Intrustion Pervention System
stops attacks from happening