Intrusion Detection and Prevention Systems

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Intrusion

A confirmed attack on information assets.

2
New cards

Back hack

Attempting to gain access into the source of the intrusion.

3
New cards

Honey pots

Decoy systems designed to lure potential hackers away from critical systems to observe their actions.

4
New cards

Honey nets

A collection of interconnected honey pots, used to observe lateral movement between systems.

5
New cards

Honey monkeys

Automated browsers that visit websites to detect malicious behavior.

6
New cards

Padded Cell

A simulated environment where detected attackers are transferred to cause no harm.

7
New cards

Trap and Trace System

A system that detects intrusions and traces them back to the source using honeypots and alarms.

8
New cards

IDS (Intrusion Detection System)

Detects and alerts on intrusions but does not act automatically.

9
New cards

IPS (Intrusion Prevention System)

Detects intrusions and automatically deploys defensive countermeasures.

10
New cards

Host based IDPS

Protects individual systems by monitoring files and user activity; can detect encrypted data but not multi-host attacks.

11
New cards

Network based IDPS

Monitors network traffic for attack patterns; can detect multi-system attacks but cannot inspect encrypted data.

12
New cards

Signature based IDPS

Matches known attack patterns; low false positives but can't detect new attacks.

13
New cards

Anomaly based IDPS

Detects deviations from normal behavior; can find new attacks but has higher false positives.

14
New cards

Stateful Protocol Analysis

Compares observed traffic against known protocol profiles; useful for detecting complex, multi-session attacks.

15
New cards

Log File Monitor (LFM)

Review and analyze system and network log files for signs of intrusion.

16
New cards

Footprinting

Organized research of internet addresses and systems owned by an organization.

17
New cards

Fingerprinting

Survey of systems to find open ports and services for more detailed information.

18
New cards

Vulnerability Scanner

Scans network segments for known vulnerabilities; example: Nessus.

19
New cards

Port Scanner

Identifies open ports on systems; example: NMAP.

20
New cards

Packet Sniffer

Captures network traffic for review and analysis; example: Wireshark.

21
New cards

Firewall Analysis Tools

Tools that discover firewall rules remotely and help optimize firewall configuration.

22
New cards

Operating System Detection Tools

Tools that detect the operating system of a remote host based on network behavior.

23
New cards

Metasploit

A platform containing a wide range of exploits, payloads, and tools for penetration testing.

24
New cards

SIEM

System that collects, aggregates, correlates, and analyzes security event data from across the organization.

25
New cards

Low interaction Honeypot

Emulates basic services; easier to deploy and easier to detect.

26
New cards

High interaction Honeypot

Real systems offered as targets; harder to detect but harder to maintain.

27
New cards

Email Honeypot

Fake email accounts that trigger alerts when accessed.

28
New cards

Database Honeypot

Fake database set up to lure attackers and monitor their actions.

29
New cards

Enticement

Legally attracting intruders without encouraging illegal activity.

30
New cards

Entrapment

Illegally inducing someone to commit a crime.

31
New cards

Regression Testing

Testing IDPS effectiveness by replaying recorded attack packets.

32
New cards

Hardness Testing

Testing how well an IDPS resists real-world attacks.

33
New cards

Hypothesis Testing

Forward-looking testing to predict how an IDPS would perform against unknown threats.

34
New cards

True Positive

Correctly identifying an actual attack.

35
New cards

False Positive

Incorrectly identifying legitimate activity as an attack.

36
New cards

False Negative

Failing to detect a real attack.

37
New cards

True Negative

Correctly identifying legitimate activity as safe.

38
New cards

Attack Surface

The set of functions and features exposed to attackers.

39
New cards

Active Intrusion Prevention

Techniques like LaBrea that delay or trap attackers by pretending to be live systems.

40
New cards