PPT ch07
PPT ch07
PPT ch07
Security,
Fourth Edition
Chapter 7
Security Technology: Intrusion
Detection and Prevention Systems,
and Other Security Tools
Do not wait; the time will never be just right. Start where you stand and
work with whatever tools you may have at your command, and better
tools will be found as you go along.
NAPOLEON HILL (18831970) FOUNDER OF THE SCIENCE of SUCCESS
Learning Objectives
Upon completion of this material, you should be
able to:
Identify and describe the categories and operating
models of intrusion detection and prevention systems
Define and describe honeypots, honeynets, and
padded cell systems
List and define the major categories of scanning and
analysis tools, and describe the specific tools used
within each of these categories
Explain the various methods of access control,
including the use of biometric access mechanisms
Principles of Information Security, Fourth Edition
Introduction
Protection of organizations assets depend as much
on people as technical controls
Technical solutions, guided by policy and properly
implemented are essential to an information
security program
Advanced technologies can be used to enhance
the security of information assets
IDPS Terminology
Alert or alarm
Evasion
False attack stimulus
False negative and
false positive
Noise
Site policy
Types of IDPS
IDSs operate as network-based or host-based
Network-based IDPS is focused on protecting
network information assets
Wireless IDPS: focuses on wireless networks
Network behavior analysis IDPS: examines traffic
flow on a network in an attempt to recognize
abnormal patterns
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
Port Scanners
Tools used by both attackers and defenders to
identify computers active on a network and other
useful information
Can scan for specific types of computers,
protocols, or resources, or their scans can be
generic
The more specific the scanner is, the better it can
give attackers and defenders useful information
50
51
52
53
Vulnerability Scanners
Active vulnerability scanners scan networks for
highly detailed information; initiate traffic to
determine holes
Passive vulnerability scanners listen in on network
and determine vulnerable versions of both server
and client software
Passive vulnerability scanners have ability to find
client-side vulnerabilities typically not found in
active scanners
54
Packet Sniffers
Network tool that collects copies of packets from
network and analyzes them
Can provide network administrator with valuable
information for diagnosing and resolving networking
issues
In the wrong hands, a sniffer can be used to
eavesdrop on network traffic
To use packet sniffer legally, administrator must be on
network that organization owns, be under direct
authorization of owners of network, and have
knowledge and consent of the content creators
Principles of Information Security, Fourth Edition
55
56
57
58
59
Effectiveness of Biometrics
Biometric technologies evaluated on three basic
criteria:
False reject rate: the rejection of legitimate users
False accept rate: the acceptance of unknown users
Crossover error rate (CER): the point where false
reject and false accept rates cross when graphed
60
Acceptability of Biometrics
Balance must be struck between how acceptable
security system is to users and its effectiveness in
maintaining security
Many biometric systems that are highly reliable and
effective are considered intrusive
As a result, many information security
professionals, in an effort to avoid confrontation
and possible user boycott of biometric controls,
dont implement them
61
62
Summary
Intrusion detection system (IDPS) detects violation
of its configuration and activates alarm
Network-based IDPS (NIDPS) vs. host-based IDPS
(HIDPS)
Selecting IDPS products that best fit organizations
needs is challenging and complex
Honey pots are decoy systems; two variations are
known as honey nets and padded cell systems
63
Summary (contd.)
Scanning and analysis tools are used to pinpoint
vulnerabilities in systems, holes in security
components, and unsecured aspects of network
Authentication is validation of prospective users
(supplicants) identity
64