Define Intrusion Detection Systems
Intrusion Detection Systems Monitor network traffic for malicious packets or patterns.
They are passive, i.e., monitor only (and maybe raise alarm) but do not filter/block.
Just detect!
Intrusion Prevention Systems
Unlike Intrusion Detection Systems, Intrusion Prevention Systems take actions to filter or block malicious traffic.
They disable the port / link and is dynamically setting rules to block traffic flow.
Define a Firewall:
Honeypot (or Host-based Intrusion Detection System)
VIRUS:
Types of virus
Anti-virus.
Worms
Spyware:
Spams
Denial of Service (DoS) :
Ola used people loitering at a bank as a example
Packet storm (DoS)
– runs on UDP (being connection-less) and sends streams of UDP packets with spoofed host address (different computer’s host address), preventing that computer from being able to respond to other traffic.
Ping Flood (DoS)
Half-open SYN
Distributed Denial of Service (DDoS) :
Man-in-the-Middle Attack:
Man-in-the-Middle Attack Type:
WiFi Eavesdropping:
Man-in-the-Middle Attack Type:
Session Hijacking: