08.02.2015 Views

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 8<br />

Security Standards and<br />

Services<br />

121<br />

<strong>Exam</strong> objectives in this chapter<br />

■ Hardware and Software Security Devices<br />

■ Security Zones<br />

■ Network Ports, Services, and Threats<br />

■ Network Access Security<br />

HARDWARE AND SOFTWARE SECURITY DEVICES<br />

Many tools that exist today will allow you to monitor, detect, and contain malicious<br />

activity in your environment. Each of these tools assists you in being<br />

well armed and well prepared to handle any malicious attacks that might come<br />

your way.<br />

Intrusion Detection Systems<br />

An intrusion detection system (IDS) is a specialized tool that attempts to determine<br />

when malicious activity is occurring within the network. It can make this<br />

determination using a variety of different methods and features:<br />

Some IDSes read and interpret the contents of log files from sensors placed<br />

on the network, routers, firewalls, servers, and other network devices, and<br />

attempt to match patterns in the log files.<br />

Some IDSes monitor all the traffic traversing a network segment and use<br />

signatures to match the traffic to known attack patterns.<br />

Some IDSes are run on a network with a known good baseline of traffic.<br />

Once they learn the “safe” traffic patterns, it attempts to determine when<br />

abnormal activity is occurring which might be an indication of an attack.<br />

Any of these IDS types could issue alarms or alerts and take various kinds<br />

of automatic action in response to suspected attacks.<br />

An IDS is designed and used to detect, attacks or unauthorized use of<br />

systems, networks, and related resources.<br />

■<br />

■<br />

■<br />

■<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!