Cybersecurity Flashcards
Classifying Intrusion Detection and Prevention Systems
Intrusion Detection System (IDS): A network monitoring tool that identifies potential threats by analyzing network traffic and logs. It is passive, logging and alerting administrators but not taking action.
Types: Network-Based (NIDS) and Host-Based (HIDS).
Intrusion Prevention System (IPS): A security tool that actively prevents threats by blocking malicious activities inline with network traffic.
Actions: Blocking IPs, terminating connections, sending alerts.
Types: Network-Based (NIPS), Host-Based (HIPS), and Content-Based.
Key Techniques:
Signature-Based Detection: Compares traffic to known attack patterns. Effective for known threats but not zero-day attacks.
Anomaly-Based Detection: Flags deviations from normal network behavior. Detects novel threats but has a higher false positive rate.
Behavioral Analysis: Monitors user activity for unusual patterns.
Protocol Analysis: Analyzes network protocols for unauthorized actions.
Cybersecurity Levels: Includes human, perimeter, network, application, endpoint, and data security layers, ensuring the security of mission-critical assets.
IDS and IPS in Cybersecurity Architecture: Operating at perimeter, internal network, and endpoint levels. IDS provides visibility, and IPS prevents attacks.
Deploying Firewalls and SIEM Solutions
Firewall: Monitors and controls network traffic based on predetermined rules, acting as a barrier between trusted and untrusted networks.
Types: Packet Filtering, Proxy Firewall, Stateful Inspection, Next-Generation Firewall (NGFW).
SIEM (Security Information and Event Management): Collects, analyzes, and correlates log data from multiple sources to identify potential threats.
Components: Event Correlation, Log Management, Threat Detection, Compliance Reporting.
Advanced Firewall Mechanisms:
Stateful Inspection, Proxy Firewalls, Next-Generation Firewall (NGFW), Unified Threat Management (UTM).
Advanced SIEM Features and Techniques:
Threat Intelligence Integration, Automated Incident Response, Machine Learning and Behavioral Analysis, Log Correlation and Data Visualization.
Advanced Threats and Attack Techniques:
Zero-Day Attacks, Advanced Persistent Threats (APT).
Firewall vs. SIEM: Firewalls block malicious IPs and prevent unauthorized downloads, while SIEM detects unusual login attempts and analyzes log data for anomalies.
Best Practices for Firewall and SIEM Deployment: layered security, regular updates, threat intelligence, and security audits.
Establishing Incident Response Procedures
Incident Response: Steps taken to detect, respond to, and recover from security threats or breaches.
Importance: Minimizes damage, reduces downtime, maintains reputation, and ensures legal and compliance adherence.
Phases:
Preparation: Develop Incident Response Plan (IRP), assign roles, implement security tools, provide training, and maintain contact lists.
Detection: Monitor network traffic, analyze logs, observe user behavior, and use endpoint security.
Containment: Isolate threats by disconnecting compromised systems, blocking malicious IPs, and disabling affected accounts.
Recovery: Restore data, reinstall systems, apply patches, report incidents, and conduct post-incident analysis.
Advanced Strategies: Forensic analysis, escalation procedures, and communication plans.
Conducting Security Training and Drills
Security Training: Educates employees and students on recognizing and responding to threats through cyberattack awareness, evacuation plans, and safe online behavior.
Common Topics: Cybersecurity, physical security, data protection, and emergency communication.
Security Drill: A practice run for emergencies to improve response time and ensure role awareness.
Drill Report: Simulated threat, involved personnel, successes, failures, and improvement strategies.
Benefits: Reduces risk, improves response, builds safety culture, and organizes responses.