Security Apps Flashcards

1
Q

What’s a personal firewall ?

Network firewall?

A

Software apps protecting your computer from unwanted internet traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s an IDS?

A

Intrusion Detection System.
A device/software that analyses all data passing through it trying to identify attacks, logging and alerting on anything suspicious.
(HIDS and NIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Signature based detection methods?

A

Where system looks for a specific string of bytes to alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Policy based detection?

A

Relies on specific declarations from security policy

e.g company might not allow use of Telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anomaly based detection ?

A

Analyses current traffic against an established baseline and triggers an alert if outside the statistical average.

E.g if employees work from 9-5 then a large download happens at 2 in the morning it would get flagged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Alerts
True positive...
True negative...
False positive...
False negative...
A

True positive = when ids correctly identifies an attack
True negative= when ids correctly identifies legitimate traffic
False positive=when ids misidentifies legit activity as an attack
False negative= when ids misidentifies an attack as legit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s an IPS?

A

Intrusion Prevention System.

Functions as a IDS but can also stop malicious activity being executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the logs from an IDS used for?

A

Used to recreate the events after an attack so we can learn from it and how to stop that attack next time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BIOS and UEFI

What’s flashing the bios?

A

-Basic Input Output System

Firmware that tells a computer instructions for how to accept input and send output.

-Unified Extensible Firmware Interface(same +)

Controls things like boot order.
Does only basic tasks.
Flashing = updating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Removable media controls

A

Technical limitations placed on a system against the USB port and other hardware devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NAS system

A

-Network Attached Storage
Storage devices connected directly to the network (Hardware room in office cliche hacker room.)
NAS systems implement RAID arrays for good availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SAN

A

Storage Area Network

-network designed to perform block storage functions consisting of NAS devices combined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to Secure a NAS system.

A
  1. Use data encryption (full disk data encryption)
  2. Use proper authentication
  3. Log NAS access (helps figure out past breaches)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s Encryption?

Some software based encryption?
What’s TPM?

A

Encryption = scrambled data into unreadable information without key.

Hardware based= self encrypting drive (SED) but expensive

Software based= (majority use) e.g FileVault,Bitlocker.

All encryption requires a key to read.

TPM is a hardware chip on a computers motherboard containing encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s AES?

A

Advanced Encryption Standard

Symmetric key encryption that supports 128 bit and 256 bit keys

BUT full disk encryption lowers performance of your system, so people may rely on file level encryption (EFS)
Also hardware based encryption is faster because the hardware is designed for encrypting
(Hardware Security Module HSM- secure hardware acting as a secure cryptoprocessor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s an endpoint?

A

Any device used to connect to our network.e.g computer, phone

17
Q

Endpoint protection tool examples

A
  • Anti-Virus(AV)
  • HIDS/HIPS(Host intrusion … systems)
  • EPP(Endpoint Protection Platforms)
  • EDR(Enpoint Detection Response platforms)
  • User and Entity Behavioural Analytics (UEBA)

All merging together as security product market improves (AEP,ATP,NGAV)

18
Q

Whats EPP (Endpoint Protection Platform)

A

Software monitoring system that acts as antivirus ,HIDS/HIPS,firewall ,Data loss prevention and file encryption in one product.

19
Q

What’s EDR (Endpoint Detection and Response)?

A

Software product that collects system data and logs for analysis and monitoring for early detection of threats[ comprise for better runtime]

20
Q

What’s UEBA? ( User and Entity Behvaioural Analytics)

A

Solution less focused on data collection and more on data analysis. Dependent on AI learning.
E.g Microsoft Advanced Threat Analytics and Splunk.