Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
CHAPTER 8<br />
Security Standards and<br />
Services<br />
121<br />
<strong>Exam</strong> objectives in this chapter<br />
■ Hardware and Software Security Devices<br />
■ Security Zones<br />
■ Network Ports, Services, and Threats<br />
■ Network Access Security<br />
HARDWARE AND SOFTWARE SECURITY DEVICES<br />
Many tools that exist today will allow you to monitor, detect, and contain malicious<br />
activity in your environment. Each of these tools assists you in being<br />
well armed and well prepared to handle any malicious attacks that might come<br />
your way.<br />
Intrusion Detection Systems<br />
An intrusion detection system (IDS) is a specialized tool that attempts to determine<br />
when malicious activity is occurring within the network. It can make this<br />
determination using a variety of different methods and features:<br />
Some IDSes read and interpret the contents of log files from sensors placed<br />
on the network, routers, firewalls, servers, and other network devices, and<br />
attempt to match patterns in the log files.<br />
Some IDSes monitor all the traffic traversing a network segment and use<br />
signatures to match the traffic to known attack patterns.<br />
Some IDSes are run on a network with a known good baseline of traffic.<br />
Once they learn the “safe” traffic patterns, it attempts to determine when<br />
abnormal activity is occurring which might be an indication of an attack.<br />
Any of these IDS types could issue alarms or alerts and take various kinds<br />
of automatic action in response to suspected attacks.<br />
An IDS is designed and used to detect, attacks or unauthorized use of<br />
systems, networks, and related resources.<br />
■<br />
■<br />
■<br />
■<br />
■