Shared Flashcard Set

Details

H - SES-602 - Module 8 - Activity Audit
N/A
19
Computer Networking
Graduate
11/28/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
Morris Worm
Definition
Considered the first worm and was certainly the first to gain significant mainstream media attention. It also resulted in the first conviction in the US under the 1986 Computer Fraud and Abuse Act. It was written by a student at Cornell University, Robert Tappan Morris, and launched on November 2, 1988 from MIT.
Term
Cuckoo's Egg
Definition
A 1989 book written by Clifford Stoll. It is his first-person account of the hunt for a computer cracker who broke into a computer at the Lawrence Berkeley National Laboratory (LBL).
Term
Instrution Prevention System (definition)
Definition
Network security appliances that monitor network and/or system activities for malicious activity. The main functions of it are to identify malicious activity, log information about said activity, attempt to block/stop activity, and report activity.
Term
Instrution Prevention System (types)
Definition

They can be classified into four different types:

1. Network-based Intrusion Prevention (NIPS)

2. Wireless Intrusion Prevention Systems (WIPS)

3. Network Behavior Analysis (NBA)

4. Host-based Intrusion Prevention (HIPS)

 

Term
Instrution Prevention System: Network-based Intrusion Prevention (NIPS)
Definition

Monitors the entire network for suspicious traffic by analyzing protocol activity.

 

Note: Focus on packet inspection.

Term
Instrution Prevention System: Wireless Intrusion Prevention Systems (WIPS)
Definition
Monitors a wireless network for suspicious traffic by analyzing wireless networking protocols.
Term
Instrusion Prevention System: Network Behavior Analysis (NBA)
Definition

Examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy violations.

 

Note: Focus on what's happening inside the network and aggregating data from many places to support determining a threat.

Term
Intrusion Detection System: Host-based Intrusion Prevention (HIPS)
Definition
An installed software package that monitors a single host for suspicious activity by analyzing events occurring within that host.
Term
Intrusion Prevention System: Detection Method: Signature-based Detection
Definition
This method of detection utilizes signatures, which are attack patterns that are preconfigured and predetermined. A signature-based intrusion prevention system monitors the network traffic for matches to these signatures. Once a match is found the intrusion prevention system takes the appropriate action.
Term
Intrusion Prevention System: Detection Method: Statistical Anomaly-based Detection:
Definition
This method of detection baselines performance of average network traffic conditions. After a baseline is created, the system intermittently samples network traffic, using statistical analysis to compare the sample to the set baseline. If the activity is outside the baseline parameters, the intrusion prevention system takes the appropriate action.
Term
Intrusion Prevention System: Detection Method: Stateful Protocol Analysis Detection
Definition
This method identifies deviations of protocol states by comparing observed events with “predetermined profiles of generally accepted definitions of benign activity.
Term
What does detect unauthorized access mean?
Definition

• Detect exploits of vulnerabilities by unauthorized
users.
• Detect security vulnerabilities created by
authorized users.
• Control and contain all authorized user activity in
the information systems environment.

Term
Who are intruders?
Definition

• authorized users using an authorized access
path in a way that does not correspond to its
purpose

• system activity by an unauthorized person who
is impersonating an authorized user (thus
appearing to the ISO as an authorized user)
• use of an access path for which there is no
business purpose, and thus is unauthorized,
due to:

• inadequate controls, or
• a zero-day threat

Term
Sidewalk Analogy
Definition

While people may be focused on their individual selves, which in this case is represented by the “home”, they are not as focused on the relationships which connect these selves, which in this case is represented by the “sidewalk”, or any “in-between” area.

 

Relation to security: People spend more time creating and perfecting their systems than they do the connections that tie the systems together.

Term
Cyber attacks can be evidenced by:
Definition

• Behavioral activity
• Configuration checking tools, e.g., unexplained configuration change
• Honey pots
• Performance monitoring
• Empty log files or log indicating bypass of security
mechanisms

• explicit policy violation
• data corruption

Term
Honeypot
Definition
A trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.
Term
Behavioral Clues indicating a possible cyber attack
Definition

• Repetition of suspicious action
• Mistyped commands or responses during automated
sequences
• Exploitation of known vulnerabilities (using scanning
tools)
• Directional inconsistencies in inbound or outbound packets
• Unexpected attributes of some service request or packet
• Unexplained problems in some service request
• Out of band knowledge about an intrusion (e.g from hacker web pages)
• Suspicious character traffic (e.g. unencrypted traffic in a secure environment)

Term
 A Warning about False Positives
Definition

It is almost impossible to tell the behavioral

difference between and intruder and a system

administrator, both enter a system with the

intent to query every possible aspect of its

operation

Term
Basic Intrusion Detection Metrics
Definition

• A - The number of machines you manage in a network
management system is one measuremen.
• B - The number of reports of security alerts.
• C - The number of those reports that signified actual
intrusions rather than false positives.
• C/A - should grow lower as systems grow more secure.
• (B-C)/A - should approach zero as intrusion detection
system gets better.

Supporting users have an ad free experience!