1.
List and briefly define three classes of intruders.
List and briefly define three classes of intruders.
Ans: Masquerader: An individual who
is not authorized to use the computer and who penetrates a system's access
controls to exploit a legitimate user's account. Misfeasor: A legitimate
user who accesses data, programs, or resources for which such access is not
authorized, or who is authorized for such access but misuses his or her
privileges. Clandestine user: An individual who seizes supervisory
control of the system and uses this control to evade auditing and access
controls or to suppress audit collection.
2.
What are two common techniques used to protect a
password file?
Ans: One-way encryption: The system
stores only an encrypted form of the user's password. When the user presents a
password, the system encrypts that password and compares it with the stored
value. In practice, the system usually performs a one-way transformation (not
reversible) in which the password is used to generate a key for the encryption
function and in which a fixed-length output is produced. Access control: Access
to the password file is limited to one or a very few accounts
3.
What are three benefits that can be provided by
an intrusion detection system?
Ans: 1. If an intrusion is detected
quickly enough, the intruder can be identified and ejected from the system
before any damage is done or any data are compromised. Even if the detection is
not sufficiently timely to preempt the intruder, the sooner that the intrusion
is detected, the less the amount of damage and the more quickly that recovery
can be achieved. 2. An effective intrusion detection system can serve as
a deterrent, so acting to prevent intrusions. 3. Intrusion detection
enables the collection of information about intrusion techniques that can be
used to strengthen the intrusion prevention facility.
4.
What is the difference between statistical
anomaly detection and rule-based intrusion
detection?
Ans: Statistical anomaly detection involves
the collection of data relating to the behavior of legitimate users over a
period of time. Then statistical tests are applied to observed behavior to
determine with a high level of confidence whether that behavior is not
legitimate user behavior. Rule-Based Detection involves an attempt to
define a set of rules that can be used to decide that a given behavior is that
of an intruder.
5.
What metrics are useful for profile-based
intrusion detection?
Ans: Counter: A nonnegative integer
that may be incremented but not decremented until it is reset by management
action. Typically, a count of certain event types is kept over a particular
period of time. Gauge: A nonnegative integer that may be incremented or
decremented. Typically, a gauge is used to measure the current value of some
entity. Interval timer: The length of time between two related events. Resource
utilization: Quantity of resources consumed during a specified period.
6.
What is the difference between rule-based
anomaly detection and rule-based penetration identification?
Ans: With rule-based anomaly detection, historical
audit records are analyzed to identify usage patterns and to generate
automatically rules that describe those patterns. Rules may represent past
behavior patterns of users, programs, privileges, time slots, terminals, and so
on. Current behavior is then observed, and each transaction is matched against
the set of rules to determine if it conforms to any historically observed
pattern of behavior. Rule-based penetration identification uses rules
for identifying known penetrations or penetrations that would exploit known
weaknesses. Rules can also be defined that identify suspicious behavior, even
when the behavior is within the bounds of established patterns of usage.
Typically, the rules used in these systems are specific to the machine and
operating system. Also, such rules are generated by "experts" rather
than by means of an automated analysis of audit records.
7.
What is a honeypot?
Ans: Honeypots are decoy systems that are
designed to lure a potential attacker away from critical systems.
8.
What is a salt in the context of UNIX password
management?
Ans: The salt is combined with the password
at the input to the one-way encryption routine.
9.
List and briefly define four techniques used to
avoid guessable passwords.
Ans:
User education: Users can be told the importance of using hard-to-guess
passwords and can be provided with guidelines for selecting strong passwords. Computer-generated
passwords: Users are provided passwords generated by a computer algorithm. Reactive
password checking: the system periodically runs its own password cracker to
find guessable passwords. The system cancels any passwords that are guessed and
notifies the user. Proactive password checking: a user is allowed to
select his or her own password. However, at the time of selection, the system
checks to see if the password is allowable and, if not, rejects it.
Thanx ,the information is helpful
ReplyDeleteHello everyone..
DeleteI'm selling fresh leads. Details in leads are:
Full name
SSN
DOB
Phone Numbers
Address
City
State
Zip
Residential Status
Account Number
DL number
Emails
All leads are genuine, fresh & generated by spaming, I Will provide you samples for checking if u want.
Dealing in almost all types of leads.
SSN Leads
Dead Fullz
Premium Leads
Mortgage Leads
Bank Account Leads
Employee Leads
Business Leads
Home Owners Leads
DL Leads
Emails Leads
Phone Numbers Leads
Each lead will b cost $1.
Also cvv Fullz available track 1 & track 2 with pin.
Interested person contact, scammers stay away, sampling is free of cost.
email > leads.sellers1212@gmail.com
Whatsapp > +923172721122
Telegram > @leadsupplier
ICQ > 752822040
**FULLZ WITH HIGH CREDIT SCORES AVAILABLE**
Delete**HACKING TOOLS WITH TUTORIALS AVAILABLE**
(High Quality, Genuine Seller)
=>Contact 24/7<=
Telegram> @killhacks
ICQ> 752822040
Skype> Peeterhacks
Fullz info included
NAME+SSN+DOB+DL+DL-STATE+ADDRESS
Employee & Bank details included
High credit fullz with DL 700+
(bulk order negotiable)
**Payment in all crypto currencies will be accepted**
->You can buy few for testing
->Invalid or wrong info will be replaced
->Serious buyers needed for long term
TOOLS & TUTORIALS AVAILABLE:
"SPAMMING" "HACKING" "CARDING" "CASH OUT"
"KALI LINUX" "BLOCKCHAIN BLUE PRINTS"
**TOOLS & TUTORIALS LIST**
->US CC Fullz
->Ethical Hacking Tools & Tutorials
->Kali Linux
->Keylogger & Keystroke Logger
->Facebook & Google Hacking
->Bitcoin Flasher
->SQL Injector
->Paypal Logins/Amazon Logins/Coinbase Logins
->Bitcoin Cracker
->SMTP Linux Root
->Shell Scripting
->DUMPS with pins track 1 and 2 with and without pin
->SMTP's, Safe Socks, Rdp's brute
->Php mailer
->SMS Sender & Email Blaster
->Cpanel
->Server I.P's & Proxies
->Viruses & VPN's
->Premium Accounts (netflix cracker, paypal logins, pornhub, amazon)
->HQ Email Combo
If you are searching for a valid vendor, I'm here for you.
You'll never be disappointed.
**You should try at least once**
Contact 24/7
Telegram> @killhacks
ICQ> 752822040
Skype> Peeterhacks
Myclassnotes: Intruders >>>>> Download Now
Delete>>>>> Download Full
Myclassnotes: Intruders >>>>> Download LINK
>>>>> Download Now
Myclassnotes: Intruders >>>>> Download Full
>>>>> Download LINK wk
Very Good contentcustom software development company
ReplyDeletethank you so much.the content is helpful
ReplyDeleteNICE POST.
ReplyDeletepython training
online training in python
**FULLZ WITH HIGH CREDIT SCORES AVAILABLE**
ReplyDelete**HACKING TOOLS WITH TUTORIALS AVAILABLE**
(High Quality, Genuine Seller)
=>Contact 24/7<=
Telegram> @killhacks
ICQ> 752822040
Skype> Peeterhacks
Fullz info included
NAME+SSN+DOB+DL+DL-STATE+ADDRESS
Employee & Bank details included
High credit fullz with DL 700+
(bulk order negotiable)
**Payment in all crypto currencies will be accepted**
->You can buy few for testing
->Invalid or wrong info will be replaced
->Serious buyers needed for long term
TOOLS & TUTORIALS AVAILABLE:
"SPAMMING" "HACKING" "CARDING" "CASH OUT"
"KALI LINUX" "BLOCKCHAIN BLUE PRINTS"
**TOOLS & TUTORIALS LIST**
->US CC Fullz
->Ethical Hacking Tools & Tutorials
->Kali Linux
->Keylogger & Keystroke Logger
->Facebook & Google Hacking
->Bitcoin Flasher
->SQL Injector
->Paypal Logins/Amazon Logins/Coinbase Logins
->Bitcoin Cracker
->SMTP Linux Root
->Shell Scripting
->DUMPS with pins track 1 and 2 with and without pin
->SMTP's, Safe Socks, Rdp's brute
->Php mailer
->SMS Sender & Email Blaster
->Cpanel
->Server I.P's & Proxies
->Viruses & VPN's
->Premium Accounts (netflix cracker, paypal logins, pornhub, amazon)
->HQ Email Combo
If you are searching for a valid vendor, I'm here for you.
You'll never be disappointed.
**You should try at least once**
Contact 24/7
Telegram> @killhacks
ICQ> 752822040
Skype> Peeterhacks
Myclassnotes: Intruders >>>>> Download Now
ReplyDelete>>>>> Download Full
Myclassnotes: Intruders >>>>> Download LINK
>>>>> Download Now
Myclassnotes: Intruders >>>>> Download Full
>>>>> Download LINK Vm