Shared Flashcard Set

Details

Security + || 3.3 IDS and SIEM
Security + || 3.3 IDS and SIEM
25
Computer Science
Undergraduate 4
12/11/2018

Additional Computer Science Flashcards

 


 

Cards

Term
Intrusion Detection Systems
Definition
Real time, passive analysis of threats with limited prevention capability, usually a sensor on a firewall, spanned port in a switch, etc.
Term
What allows combined firewall / IDS / malware scanner with active response (prevention)?
Definition
Unified Threat Management (UTM)
Term
Intrusion Prevention Systems (IPS / NIPS / IDP)
Definition
Can apply filters to the firewall, throttle bandwidth, modify packets, etc in order to help prevent threats.
Term
In-Band is less secure compared to what?
Definition
Out-Band
Term
Host Based Intrusion Detection
Definition
Agent software running on a host that monitor log files, system integrity, network interfaces, and process launches.
Term
Host-based Intrusion Prevention System (HIPS)
Definition
oPrevent changes to files

oPrevent services from being disabled

oLog off users

oClose network connections
Term
Host Based Intrusion Detection Issues
Definition
oBetter visibility into application-level data

oVulnerable to interference by malware

oCan be resource-intensive
Term
Signature Based Intrusion Detection Systems
Definition
Intrusion Detection Systems can identify attacks based on defined threats.
Term
Behavior Based Detection
Definition
Intrusion Detection Systems can learn normal system behaviors in order to flag abnormal behaviors.
Term
Anomaly Based Detection
Definition
Intrusion Detection Systems identify traffic that is non-compliant with RFCs
Term
Security Information and Event Management (SIEM)
Definition
Aggregates and correlates information from multiple log files in order to identify and flag threats.
Term
Types of Logs
Definition
oEvent

oAudit

oSecurity

oAccess

oApplication
Term
Baseline
Definition
Expected pattern of operation.
Term
Threshold
Definition
Variation in baseline that can set off an alert.
Term
Methods to make logs secure
Definition
oWritable only by system processes

oAppend-only

oRemote logging

oWrite Once, Read Many (WORM) media
Term
Methods to prevent logs from creating disk space problems
Definition
oTime zone offset

oTime / date synchronization

oEvent deduplication
Term
What is covertly removing data from its secure storage system?
Definition
Data exfiltration
Term
What scans files for matched strings and prevent unauthorized copying / transfer?
Definition
Data Loss Prevention (DLP
Term
What do Rights Management Services Do?
Definition
•Assign file permissions for different document roles

•Restrict printing and forwarding of documents

•Restrict printing and forwarding of email messages
Term
What verifies integrity of files?
Definition
Cryptographic hash or file signature
Term
Signature-based detection is failing to identify what?
Definition
Modern APT-style tools
Term
DLP
Definition
Data Loss Prevention
Term
Network and host behavior anomalies drive what?
Definition
Detection Methods
Term
What does a dropper do if ran as admin?
Definition
Installs APT tools disguised as legitimate processes / DLLs.
Term
What Do You Do To Take Care Of Malware?
Definition
Clean

Quarantine

Erase
Supporting users have an ad free experience!