What is Security Intrusion?
A security incident where the intruder gains or attempts to gain unauthorised access to a system
What is Intrusion Detection?
A security service that monitors and analyses the system for suspicious behaviour.
Intrusion Detection System (IDSs)
Is a software/application that monitors and analyses the system’s activities and determines whether or not an attack is in place
Compromises three logical components:
The two main types of IDS are:
Host-Based IDS
Network-Based IDS
What are the two Sensor Deployment?
Inline sensor
Passive sensor
What are the two Host Based Approaches?
Anomaly Detection
Signature detection
What are the NIDS Intrusion Detection Techniques?
Similar to a host-based IDS techniques
Signature detection:
Anomaly detection:
What are the Firewall characteristics? List the Security Policy
Firewall’s site’s security policy:
What are the Capabilities + Limitations of Firewall?
Capabilities:
Limitations:
What is Packet Filtering Firewall and it’s two default policies?
Two default policies
Discard: Prohibit unless expressly permitted
Forward: Permit unless expressly prohibited
What are the Packet Filter Advantages + Disadvantage?
Advantages:
Disadvantages:
What is Application-Level Gateway?
Application-Level Gateway
“Application proxy”
What is a Circuit-Level Gateway?
“Proxy”
What is a Host-Based Firewalls?
What is a Personal Firewall?
List a few Firewall Typologies
What is Intrusion Prevention Systems (IPS)?
What are Host-Based IPS (HIPS)?
Signature:
Anomaly:
Network-Based IPS (NIPS) + List the malicious packets
Malicious packets: