Monitoring and Auditing Flashcards
What is signature based monitoring?
Where network traffic is analyzed for predetermined attack patterns or “signatures”
This method has the least false positives
What type of monitoring has the least false positives?
Signature-based
What is anomaly based monitoring?
Where a baseline is established and any network traffic that deviates from the baseline is evaluated
What is behavior based monitoring?
When activity is evaluated based on the previous behavior of applications, files and OS in comparison to the current activity.
Most false positives
What type of monitoring has the most false positives?
Behavior based
What is baselining?
Process of measuring changes in the system based on deviations from a “baseline”
What is baseline reporting?
Documenting and reporting changes in a baseline
What is security posture?
Risk level to which a system element is exposed
What is an example of a common performance monitoring tool?
Windows Performance Monitor (perfmon.exe)
What is a protocol analyzer ?
A tool used to capture and analyze network traffic
Give an example of a protocol analyzer
Wireshark
What is promiscuous mode?
Where the network adapter captures all packets on the network
What is non promiscuous mode?
Where the network adapter only captures packets to itself directly
What is port mirroring?
Where one or more switch ports are configured to forward all packets to another port on the switch
What is a SPAN port?
The port used in port mirroring
What is a network tap?
Physical device that allows you to intercept network traffic
What is SNMP?
Simple Network Management Protocol - aids in monitoring network attached devices and computers
What are managed devices in SNMP?
Computers and other devices that are monitored through the use of agents by a network management system
What is an agent in SNMP ?
Software that is loaded on a managed device to redirect info to the network management system
What is a network management system ?
Software run on one or more servers to control monitoring of all network attached devices
What is the issue with versions 1 and 2 of SNMP
Lack of security due to the use of community strings - public (read only) or private (allows read write access)
What makes SNMP version 3 better?
Version 3 provides integrity, authentication and encryption of the messages being sent over the network
How does SNMP V3 provide integrity, authentication and encryption?
- Messages are hashed before transmission
- Message source is validated
- DES encryption
What is in band communication
In SNMP, when data is sent over the network you are using
Cheaper, easier, less secure