Term
Intrusion Detection Systems |
|
Definition
Real time, passive analysis of threats with limited prevention capability, usually a sensor on a firewall, spanned port in a switch, etc. |
|
|
Term
What allows combined firewall / IDS / malware scanner with active response (prevention)? |
|
Definition
Unified Threat Management (UTM) |
|
|
Term
Intrusion Prevention Systems (IPS / NIPS / IDP) |
|
Definition
Can apply filters to the firewall, throttle bandwidth, modify packets, etc in order to help prevent threats. |
|
|
Term
In-Band is less secure compared to what? |
|
Definition
|
|
Term
Host Based Intrusion Detection |
|
Definition
Agent software running on a host that monitor log files, system integrity, network interfaces, and process launches. |
|
|
Term
Host-based Intrusion Prevention System (HIPS) |
|
Definition
oPrevent changes to files
oPrevent services from being disabled
oLog off users
oClose network connections |
|
|
Term
Host Based Intrusion Detection Issues |
|
Definition
oBetter visibility into application-level data
oVulnerable to interference by malware
oCan be resource-intensive |
|
|
Term
Signature Based Intrusion Detection Systems |
|
Definition
Intrusion Detection Systems can identify attacks based on defined threats. |
|
|
Term
|
Definition
Intrusion Detection Systems can learn normal system behaviors in order to flag abnormal behaviors. |
|
|
Term
|
Definition
Intrusion Detection Systems identify traffic that is non-compliant with RFCs |
|
|
Term
Security Information and Event Management (SIEM) |
|
Definition
Aggregates and correlates information from multiple log files in order to identify and flag threats. |
|
|
Term
|
Definition
oEvent
oAudit
oSecurity
oAccess
oApplication |
|
|
Term
|
Definition
Expected pattern of operation. |
|
|
Term
|
Definition
Variation in baseline that can set off an alert. |
|
|
Term
Methods to make logs secure |
|
Definition
oWritable only by system processes
oAppend-only
oRemote logging
oWrite Once, Read Many (WORM) media |
|
|
Term
Methods to prevent logs from creating disk space problems |
|
Definition
oTime zone offset
oTime / date synchronization
oEvent deduplication |
|
|
Term
What is covertly removing data from its secure storage system? |
|
Definition
|
|
Term
What scans files for matched strings and prevent unauthorized copying / transfer? |
|
Definition
Data Loss Prevention (DLP |
|
|
Term
What do Rights Management Services Do? |
|
Definition
•Assign file permissions for different document roles
•Restrict printing and forwarding of documents
•Restrict printing and forwarding of email messages |
|
|
Term
What verifies integrity of files? |
|
Definition
Cryptographic hash or file signature |
|
|
Term
Signature-based detection is failing to identify what? |
|
Definition
|
|
Term
|
Definition
|
|
Term
Network and host behavior anomalies drive what? |
|
Definition
|
|
Term
What does a dropper do if ran as admin? |
|
Definition
Installs APT tools disguised as legitimate processes / DLLs. |
|
|
Term
What Do You Do To Take Care Of Malware? |
|
Definition
|
|