GCGA Ch. 4 Exploring Advanced Security Devices (ST) Flashcards
(7 cards)
IDS
intrusion detection system - inspects network traffic in order to detect malicious activity or policy violations; out-of-band, passive.
IPS
intrusion prevention system - monitors network traffic and takes automated actions to prevent threats, such as blocking or terminating connections. Placed in-line (in-band) with traffic & can stop attacks before they reach internal network; can actively monitor data streams, detect malicious content, and prevent it from reaching a network.
HIDS vs NIDS
HIDS can detect attacks on local systems such as workstations and servers. The HIDS monitors local resources on the host and can detect some malware that isn’t detected by traditional antivirus software. A network-based IDS (NIDS) detects attacks on networks.
Signature-based IDS or IPS
uses signatures to detect known attacks or vulnerabilities.
Trend-based IDS
(also called anomaly-based IDSs) require a baseline and detect attacks based on anomalies or when traffic is outside expected boundaries.
SCADA network
Supervisory Control And Data Acquisition - an architecture that enables industrial organizations to manage, monitor, and control processes, machines, and plants.
Honeypots & honeynets
appear to have valuable data and attempt to divert attackers away from live networks. Security personnel use them to deceive attackers, disrupt attacks, and observe attackers’ current attack methodologies. A honeyfile is a file designed to attract the attention of an attacker. Honeytokens are fake records inserted into databases to detect data theft