問題一覧
1
type of attack on information assets in which the instigator attempts to gain entry into a system or disrupt the normal operation of system with the intent to do malicious harm
intrusion
2
activities that deter an intrusion
intrusion prevention
3
procedures and systems that identify system intrusions
intrusion detection
4
activities finalized the restoration of operations to a normal state and activities seek to identify the source and method of attack for prevention
intrusion correction
5
commercially available in late 1990
intrusion detection system
6
works like a burglar alarm
intrusion detection system
7
generally accepted combination
intrusion detection and prevention system
8
intrusion detection and prevention system terminologies
alarm or alert, evasion, false attack stimulus, false negative, false positive, noise, site policy, site policy awareness, true attack stimulus, tuning, confidence value, alarm filtering, alarm clustering and compaction
9
indication that attack is happening
alarm or alert
10
attacker change the format and/or timing of activities to avoid being detected
evasion
11
event triggers alarm - no real attack
false attack stimulus
12
failure of IDPS to react to attack
false negative
13
alarm activates in the absence of an actual attack
false positive
14
alarms events that are accurate but don't pose threats
noise
15
rules and configuration guidelines governing the implementation and operation of IDPS
site policy
16
ability to dynamically modify configuration in response to environmental activity
site policy awareness
17
event that triggers alarms in event of real attack
true attack stimulus
18
adjusting an IDPS
tuning
19
measure of IDPS ability to correctly detect and identify type of attacks
confidence value
20
classification of IDPS alerts
alarm filtering
21
grouping almost identical alarms happening at close to the same time
alarm clustering and compaction
22
act as quality control for security design and administration
IDPS
23
types of IDPS
network based, host-based
24
focused on protection network information assets
network based
25
besides on computer or appliance connected to a segment of organization network
network based
26
wireless, monitors packets, looks for attack patterns
network based
27
known signatures in network-based
protocol verification, application verification
28
packet structure
protocol verification
29
Packet use
application verification
30
focused on protection server of host's information assets
host-based
31
resides on a particular computer or server and monitors traffic only on that system
host-based
32
also known as system integrity verifiers
host-based
33
classifies files in categories and applies various notification actions based on rules
host-based
34
can monitor multiple computer simultaneously
host-based
35
monitors and analyzes wireless network
wireless NIDPS
36
examines application for abnormal events
application based
37
tracks interaction between users and applications
application based
38
two dominate methodologies
signature-based, statistical-anomaly approach
39
examines data traffic in search of patterns that match known signature
signature-based
40
based on frequency on which network activities take place
statistical anomaly based
41
collect statistical summaries of normal traffic to form baseline
statistical anomaly based
42
similar to NIDS, reviews logs
log file monitors
43
looks for patterns signatures in log files
log file monitors
44
able to look at multiple log files from different systems
log file monitors
45
control strategies
centralized, partially distributed, fully distributed
46
all IDS control functions are implemented and managed in a centralized location
centralized
47
individual agents respond to local threats
partially distributed
48
report to a hierarchical central facility, one of the more effective methods
partially distributed
49
opposite of centralized
fully distributed
50
All control functions apply that the physical location of each ID is component
fully distributed
51
decoy systems
honey pots
52
lure potential attackers away from critical systems
honey pots
53
encourages attacks against themselves
honey pots
54
collection of honey pots
honey net
55
connects honey pots on a subnet
honey net
56
contains pseudo services the emulated well-known services
honey net
57
protected honey pot
padded cell
58
IDS detects attacks and transfers to simulated environment
padded cell
59
detect intrusion and trace incident back
trap and trace systems
60
consist of honey pot or padded cell and alarm
trap and trace systems
61
help find vulnerabilities in system
scanning and analysis tools
62
allow system admin to see what the attacker sees
scanning and analysis tools
63
what is active on computer
port scanners
64
scanning and analysis tools
port scanners, firewall analysis tools, operating system detection tools, vulnerability scanners, packet sniffers
65
validation of users identity
authentication