356 IDS Updated PDF

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 17

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

18 Terms

1

Intrusion Detection

A hardware or software function that gathers and analyzes information from various areas within a computer or a network to identify possible security intrusions.

New cards
2

Cyber Criminals

Individuals or members of organized crime groups with a goal of financial reward, engaging in activities such as identity theft and data ransoming.

New cards
3

Hacktivists

Individuals or groups motivated by social or political causes, often aimed at promoting their cause through website defacement or denial of service attacks.

New cards
4

Advanced Persistent Threats (APTs)

Groups of hackers sponsored by governments to conduct espionage or sabotage activities.

New cards
5

Script-kiddies

Hackers with minimal technical skill who primarily use existing attack toolkits.

New cards
6

Host-Based IDS (HIDS)

Monitors the characteristics of a single host for suspicious activity.

New cards
7

Network-Based IDS (NIDS)

Monitors network traffic and analyzes protocols to identify suspicious activity.

New cards
8

Anomaly Detection

Involves the collection of data relating to the behavior of legitimate users to determine if current behavior indicates an intruder.

New cards
9

Signature Detection

Involves matching known patterns of malicious data against data stored on a system or in transit over a network.

New cards
10

Buffer Overflow Vulnerabilities

Flaws in a program that allows a hacker to manipulate memory allocation, often exploited by classic hackers.

New cards
11

Privilege Escalation

A tactic used by intruders to gain higher access rights within a system after initial access.

New cards
12

Data Sources and Sensors

Fundamental components of intrusion detection that collect data from various sources like system call traces and log files.

New cards
13

Denial of Service (DoS) attacks

Attacks intended to disrupt the normal functionality of a network service, making it unavailable to its intended users.

New cards
14

Intrusion Detection System (IDS)

Comprises three logical components: sensors that collect data, analyzers that determine if an intrusion has occurred, and a user interface to view output.

New cards
15

Network Traffic

Data packets transmitted over a network that are analyzed by NIDS to detect suspicious activity.

New cards
16

Exploits

Vulnerabilities in a system that can be exploited by intruders for unauthorized access or damage.

New cards
17

Data Ransoming

A method used by cyber criminals where sensitive data is held hostage until a ransom is paid.

New cards
18

Covering tracks

The behavior of intruders aimed at erasing or hiding their activities and presence in a system after a successful attack.

New cards
robot