• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

Defined as a system that monitors a network and scan it.

Intrusion Detection and Prevention System ( IDPS )

only monitors and alerts bad traffic

IDS

Take automated course of action to prevent possible incidents.

IPS

also gives the security team birds eye view of the traffic flowing through its network.

IDS-IPS

monitor entire networks segments for malicious traffic. This is usually done by analyzing protocol activity.

NETWORK-BASED INTRUSION PREVENTION SYSTEM ( NIPS )

usually deployed at network boundaries behind firewalls routers and remote access.

NIPS NETWORK-BASED INTRUSION PREVENTION SYSTEM

monitor wireless networks by analyzing wireless networking specific protocols.

Wireless Intrusion Prevention System ( WIPS )

deployed within the wireless network and in areas that are susceptible to unauthorized wireless networking.

WIPS — Wireless Intrusion Prevention System

analyze deviations in protocol activity, network behavior analysis systems identify threats by checking for unusual traffic patterns.

NETWORK BEHAVIOR ANALYSIS ( NBA )

are deployed in an organization's internal networks and at points where traffic flows between internal and external networks.

NBA NETWORK BEHAVIOR ANALYSIS SYSTEM

differ from the rest in that they're deployed in a single host.

HOST-BASED INTRUSION PREVENTION SYSTEM ( HIPS )

traffic flowing in and out of that particular host by monitoring running processes

HIPS HOST-BASED INTRUSION PREVENTION SYSTEM

These tools continuously monitor network traffic and systems for signs of malicious activity, allowing for rapid response to security threats.

REAL-TIME MONITORING

IDPS tool should allow users to enforce intrusion rules.

INTRUSION RULES ENFORCEMENT

Another important feature of IDS tools is maintaining detailed logs.

Activity Logs and Insights

Immediately identify a malicious presence as soon as it is felt within the network.

MALICIOUS PRESENCE DETECTION

The IDS tools should block intruders and mitigate the damage they cause.

MALICIOUS PRESENCE BLOCKING

single service or computer on a network that is configured to act as a decoy attracting and trapping would be attackers.

HONEYPOTS

TWO PRIMARY TYPES OF HONEYPOTS

PRODUCTION HONEYPOTS


— RESEARCH HONEYPOTS

serve as decoy system inside fully operating networks and servers often as part of an intrusion detection system ( IDS )

PRODUCTION HONEYPOTS

Used for educational purposes and security enhancement.

RESEARCH HONEYPOTS

honeypots can also be viewed in another dimension based on interaction levels.

1. LOW INTERACTION HONEYPOTS


2. MEDIUM INTERACTION HONEYPOTS


3. HIGH INTERACTION HONEYPOTS

This class gives the attackers some small insights and network control.

LOW INTERACTION HONEYPOTS

This model allows relatively more interaction with hackers unlike the low interaction ones.

MEDIUM INTERACTION HONEYPOTS

are decoy network containing collections of honeypots in highly monitored networks.

HONEYNETS