Cybersecurity Curriculum - Intrusion-Detection Systems

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/34

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards covering vocabulary and key concepts from the Cybersecurity Curriculum focused on Intrusion-Detection Systems.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

Intrusion-Detection Systems (IDS)

Systems that enable administrators and analysts to detect possible attacks on the network.

2
New cards

Honeypot

A decoy system set up to appear as an important server to track and catch hackers.

3
New cards

Preemptive Blocking

Attempts to detect impending intrusions but is susceptible to false positives and may block legitimate traffic.

4
New cards

Anomaly Detection

Detects activities that deviate from the norm, saved in logs for analysis.

5
New cards

Threshold Monitoring

Defines acceptable behavior levels and monitors whether these levels are exceeded.

6
New cards

Resource Profiling

Measures system-wide resource use to develop a historic usage profile.

7
New cards

User/Group Work Profiling

Stores typical activities of each user/group to identify suspect behavior.

8
New cards

Executable Profiling

Monitors how programs use system resources to detect possible malware.

9
New cards

IDS Components

Includes sensors, analyzers, alerts, and operators involved in intrusion detection.

10
New cards

Passive IDS vs Active IPS

IDS logs activity while IPS takes steps to prevent an ongoing attack.

11
New cards

Snort

An open-source IDS known for its versatility across multiple platforms and operation modes.

12
New cards

Sniffer Mode

Reads and displays network packets in a continuous stream for monitoring.

13
New cards

Packet Logger Mode

Logs packets to disk for analysis at a later time.

14
New cards

Network Intrusion Detection System (NIDS)

Analyzes network traffic using a heuristic approach, adjusting its learning process.

15
New cards

Cisco IDS Models

Includes Cisco IDS 4200 Series Sensors and the Next-Generation IPS Solution.

16
New cards

Specter

A software honeypot that simulates various services of network servers.

17
New cards

Open Mode (Honeypot)

Behaves like a badly configured server to attract potential hackers.

18
New cards

Secure Mode (Honeypot)

Acts like a secure server to minimize risk while tracking intruders.

19
New cards

False Positives

Instances where legitimate activity is mistakenly identified as a threat.

20
New cards

Alert

Notification sent to administrators when suspicious activity is detected.

21
New cards

Monitoring

The process of observing and analyzing network activities to detect intrusions.

22
New cards

Heuristic Approach

Learning from previous experiences to identify new threats in intrusion detection.

23
New cards

Firewall Integration

Intrusion-detection systems should be used in conjunction with firewalls for effective security.

24
New cards

Dynamic User Base

A changing group of users that can complicate user profiling in anomaly detection.

25
New cards

Historical Usage Profile

A record of normal resource use that helps identify abnormal activity.

26
New cards

Illicit Activity

Unauthorized or illegal actions potentially detected through anomaly detection.

27
New cards

Behavioral Profiles

Profiles that represent normal behavior patterns of users or groups.

28
New cards

Event Notification

The process of informing operators about detected incident or anomalies.

29
New cards

Network Traffic Analysis

The examination of data traveling across the network to identify potential threats.

30
New cards

Emulate Services (Honeypot)

To replicate real server services to entice hackers into engaging with the honeypot.

31
New cards

Security Information and Event Manager (SIEM)

Tools that help in the collection and analysis of security data.

32
New cards

Banishment Vigilance

The concept of consistently monitoring and discouraging potential intrusions.

33
New cards

False Negatives

Instances where actual threats are not detected or acknowledged.

34
New cards

Packet Contents Analysis

Reviewing the information contained in network packets for anomalies.

35
New cards

Protective Measures

Strategies and tools used to safeguard networks from intrusions.