Session 08: Attacks prevention Flashcards
1
Q
How to detect cyber attacks?
A
- IDS : Intrusion Detection System
* Identify unauthorized access and malicious activities within computer networks or systems. - Maintain and Monitor Detection Logs
- EDR : Endpoint detection and Response
* Detecting, investigating and mitigating suspicious activities and threats specifically on individual devices or endpoints within a network. - SIEM : Security Information and Event Management
- NTA : Network Traffic Analysis
* Observing and interpreting the flow of network traffic to detect and respond to potential security threats. - Vulnerability scanning
* Identify and evaluate security weaknesses within networks, systems and applications. - Penetration testing
* Simulating potential attacks from malicious entities, both external and internal - Honeypots
* Intentionally created decoy systems to attract and deceive attackers. - UEBA : User and Entity Behavior Analytics
2
Q
Types of IDS?
A
- NIDS : Network based
- HIDS : Host-based
3
Q
Techniques that used in IDS to identify threats?
A
- Signature based detection
- Anomaly based detection
- Heuristic based detection
4
Q
Key techniques used in NTA?
A
- Signature based detection
- Anomaly detection
- Behavioral analysis
5
Q
Penetration testing process stages?
A
- Scope definition
- Reconnaissance
- Vulnerability scanning
- Exploitation
- Post-Exploitation
- Reporting and Remediation
6
Q
How to prevent cyber attacks?
A
- Encrypt and backup data
- Educate staff on cyber security
- Create security focused workplace culture.
- Conduct regular audit
- Restrict admin rights
- Access control and least privilege.
- Install a firewall
- Install Anti-virus program and update regularly
- Risk assessment and management
- Patch management
- Incident response and Disaster recovery plan