暗記メーカー

お問い合わせ
ログイン
LEC 7
  • Julia Cristine Tadeo

  • 問題数 65 • 6/22/2024

    問題一覧

  • 1

    type of attack on information assets in which the instigator attempts to gain entry into a system or disrupt the normal operation of system with the intent to do malicious harm

    intrusion

  • 2

    activities that deter an intrusion

    intrusion prevention

  • 3

    procedures and systems that identify system intrusions

    intrusion detection

  • 4

    activities finalized the restoration of operations to a normal state and activities seek to identify the source and method of attack for prevention

    intrusion correction

  • 5

    commercially available in late 1990

    intrusion detection system

  • 6

    works like a burglar alarm

    intrusion detection system

  • 7

    generally accepted combination

    intrusion detection and prevention system

  • 8

    intrusion detection and prevention system terminologies

    alarm or alert, evasion, false attack stimulus, false negative, false positive, noise, site policy, site policy awareness, true attack stimulus, tuning, confidence value, alarm filtering, alarm clustering and compaction

  • 9

    indication that attack is happening

    alarm or alert

  • 10

    attacker change the format and/or timing of activities to avoid being detected

    evasion

  • 11

    event triggers alarm - no real attack

    false attack stimulus

  • 12

    failure of IDPS to react to attack

    false negative

  • 13

    alarm activates in the absence of an actual attack

    false positive

  • 14

    alarms events that are accurate but don't pose threats

    noise

  • 15

    rules and configuration guidelines governing the implementation and operation of IDPS

    site policy

  • 16

    ability to dynamically modify configuration in response to environmental activity

    site policy awareness

  • 17

    event that triggers alarms in event of real attack

    true attack stimulus

  • 18

    adjusting an IDPS

    tuning

  • 19

    measure of IDPS ability to correctly detect and identify type of attacks

    confidence value

  • 20

    classification of IDPS alerts

    alarm filtering

  • 21

    grouping almost identical alarms happening at close to the same time

    alarm clustering and compaction

  • 22

    act as quality control for security design and administration

    IDPS

  • 23

    types of IDPS

    network based, host-based

  • 24

    focused on protection network information assets

    network based

  • 25

    besides on computer or appliance connected to a segment of organization network

    network based

  • 26

    wireless, monitors packets, looks for attack patterns

    network based

  • 27

    known signatures in network-based

    protocol verification, application verification

  • 28

    packet structure

    protocol verification

  • 29

    Packet use

    application verification

  • 30

    focused on protection server of host's information assets

    host-based

  • 31

    resides on a particular computer or server and monitors traffic only on that system

    host-based

  • 32

    also known as system integrity verifiers

    host-based

  • 33

    classifies files in categories and applies various notification actions based on rules

    host-based

  • 34

    can monitor multiple computer simultaneously

    host-based

  • 35

    monitors and analyzes wireless network

    wireless NIDPS

  • 36

    examines application for abnormal events

    application based

  • 37

    tracks interaction between users and applications

    application based

  • 38

    two dominate methodologies

    signature-based, statistical-anomaly approach

  • 39

    examines data traffic in search of patterns that match known signature

    signature-based

  • 40

    based on frequency on which network activities take place

    statistical anomaly based

  • 41

    collect statistical summaries of normal traffic to form baseline

    statistical anomaly based

  • 42

    similar to NIDS, reviews logs

    log file monitors

  • 43

    looks for patterns signatures in log files

    log file monitors

  • 44

    able to look at multiple log files from different systems

    log file monitors

  • 45

    control strategies

    centralized, partially distributed, fully distributed

  • 46

    all IDS control functions are implemented and managed in a centralized location

    centralized

  • 47

    individual agents respond to local threats

    partially distributed

  • 48

    report to a hierarchical central facility, one of the more effective methods

    partially distributed

  • 49

    opposite of centralized

    fully distributed

  • 50

    All control functions apply that the physical location of each ID is component

    fully distributed

  • 51

    decoy systems

    honey pots

  • 52

    lure potential attackers away from critical systems

    honey pots

  • 53

    encourages attacks against themselves

    honey pots

  • 54

    collection of honey pots

    honey net

  • 55

    connects honey pots on a subnet

    honey net

  • 56

    contains pseudo services the emulated well-known services

    honey net

  • 57

    protected honey pot

    padded cell

  • 58

    IDS detects attacks and transfers to simulated environment

    padded cell

  • 59

    detect intrusion and trace incident back

    trap and trace systems

  • 60

    consist of honey pot or padded cell and alarm

    trap and trace systems

  • 61

    help find vulnerabilities in system

    scanning and analysis tools

  • 62

    allow system admin to see what the attacker sees

    scanning and analysis tools

  • 63

    what is active on computer

    port scanners

  • 64

    scanning and analysis tools

    port scanners, firewall analysis tools, operating system detection tools, vulnerability scanners, packet sniffers

  • 65

    validation of users identity

    authentication