Writing Assignment: Module 07 Flashcards

1
Q

What is an intrusion?

A

An adverse event in which an attacker attempts to gain entry into an information system or disrupt its normal operations, almost always with the intent to do harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an IDPS?

A

The general term for a system that can both detect and modify its configuration and environment to prevent intrusions. An IDPS encompasses the functions of both intrusion detection systems and intrusion prevention technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an intrusion detection system and how does it differ from an IDPS?

A

An intrusion detection system (IDS) is defined as a solution that monitors network events and analyzes them to detect security incidents and imminent threats. An intrusion prevention system (IPS) is defined as a solution that performs intrusion detection and then goes one step ahead and prevents any detected threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe alarm clustering and alarm compaction. Why are these actions performed?

A

Alarm clustering and alarm compaction are techniques used in alarm management systems.

Alarm clustering involves grouping similar alarms, For example, if multiple alarms are triggered by a single cause, such as a power outage, they can be clustered together to show that there is a single root cause.

Alarm compaction involves reducing the number of alarms presented to the operator by combining multiple alarms into a single notification. Compacting alarms can help operators to focus on important alarms and reduce the risk of alarm overload.

These actions are performed to improve the efficiency and effectiveness of alarm management systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a confidence value in the context of an IDPS?

A

A confidence value represents the level of certainty that the system has in its determination that a detected event is indeed an attack or malicious activity, rather than a benign or normal event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the compelling reasons to acquire and use an IDPS?

A
  1. Detect and prevent cyber attacks
  2. Compliance with regulations
    3.Reduce risk
    4.Provide real-time monitoring
    5.Increase network visibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is defense in depth?

A

Defense in depth is a security strategy that involves deploying multiple layers of security controls and countermeasures to protect a network or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three dominant placements for IDPSs? Give one advantage and one disadvantage to each approach.

A

Network-based
Advantage: Network-based IDPSs can detect threats that originate from both external and internal sources.

Disadvantage: Network-based IDPSs can be resource-intensive.

Host-based
Advantage: Host-based IDPSs can detect threats that originate from within the network.

Disadvantage: Host-based IDPSs can be more difficult to manage and maintain.

Hybrid IDPS
Advantage: Hybrid IDPSs can provide a more complete picture of the network environment, and can detect and prevent a wider range of security threats.

Disadvantage: Hybrid IDPSs can be complex and difficult to manage, and may require more resources than other types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the relationship between an IDPS’s total cost of ownership and its acquisition cost?

A

The total cost of ownership of IDPSs well exceeds acquisition costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a rootkit and why is the presence of a rootkit concerning?

A

Rootkits are typically inserted into a system through a social engineering attack on an unsuspecting user or during an intrusion by an external attacker.

Rootkits allow access and possibly privilege escalation by subverting standard operating system functionality, common utility programs, or other applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the dominant approaches used to detect intrusions in IDPSs? Give one advantage and one disadvantage to each approach.

A

Signature-based detection,
Advantage: Signature-based detection is effective at detecting known attacks and can be easy to implement and manage.

Disadvantage: Signature-based detection is not effective at detecting new or unknown attacks.

Anomaly-based detection,
Advantage: Anomaly-based detection can detect previously unknown or zero-day attacks and can be effective at detecting insider threats.

Disadvantage: Anomaly-based detection can generate false positives if the baseline is not properly established.

Behavioral-based detection,
Advantage: Behavioral-based detection can detect previously unknown or zero-day attacks, and is effective at detecting insider threats.

Disadvantage: Behavioral-based detection can be complex and resource-intensive, and may require significant processing power and data storage to be effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a SPAN port and how is it different from a tap?

A

difference between a SPAN (Switched Port Analyzer) port and a tap is that a SPAN port is a feature of a network switch, while a tap is a separate physical device that is inserted into the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the clipping level?

A

The measured activity level at which an IDPS triggers an alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a log file monitor? What is it used to accomplish?

A

log file monitor is a software tool or system component that tracks changes to log files.
log monitoring is used to accomplish,
Troubleshooting
Performance analysis
Security monitoring
Compliance auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the term trap and trace mean?

A

A system that combines resources to detect an intrusion and then trace its network traffic back to the source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a honeypot? What is a honeynet? How are they different?

A

A honeypot is a security tool or system component that is designed to detect and deflect, it’s typically a computer or virtual machine that is isolated from the rest of the network and is deliberately left vulnerable to attack, in order to attract and trap attackers.

A honeynet is a network of honeypots that is designed to simulate a real production network, with multiple systems and services that mimic those found in an actual network.

honeypot is typically a single system, while a honeynet is a network of systems.

17
Q

What are the core capabilities of a SIEM system?

A

Log Management
Correlation
Real-time Monitoring
Threat Intelligence
Incident Response
Compliance Management
User and Entity Behavior Analytics (UEBA)

18
Q

What is dwell time?

A

the duration between the start of a cyber intrusion and the time it is detected

19
Q

What are the principal questions to ask when selecting a SIEM solution?

A

What’s the end goal of our SIEM deployment?
Who will support and manage the SIEM solution?
What level of investment should we commit to a SIEM purchase?
What are the SIEM system’s core capabilities?
What is the SIEM system’s support for compliance requirements?