module 8 Flashcards

(12 cards)

1
Q

Learning Objectives:

Know about classes of intruders and intruder behavior

Understand the basic principles and requirements for intrusion detection

Discuss key features of intrusion detection systems

Explain intrusion detection techniques
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Contents Covered:

Intruder Classes

Intrusion Detection

Analysis Approaches

Host and Network-Based Intrusion Detection

Machine Learning in Intrusion Detection
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: An intruder is only someone who gains unauthorized access to a system with malicious intent.

A

Answer: False. Intruders may also include individuals who access systems without malicious intent, such as hackers with varying motivations (e.g., curiosity or experimentation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multiple Choice: Which of the following best describes a “masquerader” intruder?

A. A legitimate user who exploits system vulnerabilities

B. A malicious actor who impersonates a legitimate user to gain unauthorized access

C. A hacker who manipulates system data

D. A system administrator who unknowingly causes a security breach
A

Answer: B. A malicious actor who impersonates a legitimate user to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Short Answer: What is the primary distinction between host-based and network-based intrusion detection systems (IDS)?

A

Answer: Host-based IDS monitor and analyze activities on individual devices or systems, while network-based IDS monitor traffic across a network to detect suspicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multiple Choice: Which of the following is a key feature of an intrusion detection system?

A. Encrypting network traffic

B. Identifying and responding to suspicious activities in real-time

C. Blocking all incoming network connections

D. Implementing firewall rules for outgoing traffic
A

Answer: B. Identifying and responding to suspicious activities in real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Short Answer: Explain how machine learning can enhance intrusion detection systems.

A

Answer: Machine learning algorithms can analyze large volumes of network traffic and system logs to identify abnormal patterns and detect intrusions, continuously improving as more data is processed, making the system more accurate over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Intrusion detection systems are most effective when used in isolation, without additional security measures like firewalls or antivirus software.

A

Answer: False. IDS are most effective when integrated with other security measures, such as firewalls and antivirus systems, to provide a multi-layered defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multiple Choice: Which of the following is an example of an analysis approach used by intrusion detection systems?

A. Signature-based detection

B. Random forest classification

C. Bayesian inference

D. Data encryption
A

Answer: A. Signature-based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Short Answer: How does signature-based intrusion detection differ from anomaly-based detection?

A

Answer: Signature-based detection relies on known patterns or signatures of attacks, while anomaly-based detection identifies deviations from established norms, which could indicate a new or unknown attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Essay-Like Prompt: Discuss the principles and requirements of intrusion detection systems. How do host-based and network-based IDS compare in terms of detection scope, response time, and efficiency?

A

Answer: Intrusion detection systems (IDS) are designed to detect suspicious activities within a network or host to protect against unauthorized access. Host-based IDS analyze events on individual systems, while network-based IDS monitor network traffic to detect attacks. Host-based systems provide more granular detection but can be resource-intensive, while network-based systems offer broader monitoring but may miss system-specific attacks. Both types require ongoing tuning and integration with other security measures for maximum effectiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multiple Choice: What class of intruder typically uses social engineering tactics to exploit human behavior for system access?

A. The insider

B. The hacktivist

C. The masquerader

D. The social engineer
A

Answer: D. The social engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly