Cyber Security Concepts

Cyber Security Concepts

Assessment

Flashcard

Computers

12th Grade

Easy

Created by

Miss Watters

Used 2+ times

FREE Resource

Student preview

quiz-placeholder

8 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What is an Intrusion Detection System (IDS)?

Back

An IDS is designed to expose any attempts by attackers to compromise data or other resources. It is a monitoring system that requires a human to look at the results to take action.

2.

FLASHCARD QUESTION

Front

How does an Intrusion Prevention System (IPS) differ from an IDS?

Back

An IPS is a control system that can block attacks using an external database to take action, unlike an IDS which only monitors and requires human intervention.

3.

FLASHCARD QUESTION

Front

What is a Network Intrusion Detection System (NIDS)?

Back

A NIDS is network-based, monitors all traffic on the network, intercepts data packets, identifies anything suspicious, and alerts managing staff. It is installed at specific points between the network and external environment.

4.

FLASHCARD QUESTION

Front

What is a Host Intrusion Detection System (HIDS)?

Back

A HIDS examines traffic directed at the host or single computer it is protecting, detecting any unusual, unauthorized, or illegal activities on a specific device.

5.

FLASHCARD QUESTION

Front

What are the two types of detection methods used by IPS?

Back

IPS uses signature-based detection, which monitors for specific patterns used by malware, and anomaly-based detection, which compares current network traffic to a baseline to detect unusual patterns.

6.

FLASHCARD QUESTION

Front

What is statistical anomaly detection?

Back

It samples network traffic and compares it to a baseline to detect patterns that are not normally present, allowing for real-time alerts and immediate action.

7.

FLASHCARD QUESTION

Front

What is signature-based detection?

Back

It monitors inbound network traffic to find sequences and patterns that match a particular attack signature, identifying specific patterns used by malware.

8.

FLASHCARD QUESTION

Front

What is anomaly-based detection?

Back

It involves taking a baseline of normal traffic and activity on the network and measuring current traffic against this baseline to detect unusual patterns.