Vulnerabilities in Cybersecurity
38 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a signature in the context of a Network Intrusion Detection System (NIDS)?

  • A type of encryption used in NIDS
  • A description of the content of network packets during a specific attack (correct)
  • A description of normal network communication patterns
  • A type of anomaly-based NIDS

What is a limitation of anomaly-based NIDS?

  • They can detect all types of threats
  • They assume no malicious activity during training (correct)
  • They require frequent database updates
  • They are only used in signature-based NIDS

Why may a NIDS be unable to detect certain threats?

  • Because the NIDS is not using TLS interception
  • Because the NIDS has limited information about network communication (correct)
  • Because the NIDS is not updated regularly
  • Because the NIDS is only signature-based

What is a disadvantage of TLS interception in NIDS?

<p>It allows administrators to eavesdrop on encrypted communication (D)</p> Signup and view all the answers

What is a characteristic of signature-based NIDS?

<p>They use a database of known attack patterns (C)</p> Signup and view all the answers

Why must an anomaly-based NIDS be retrained?

<p>When new software is introduced on the network (A)</p> Signup and view all the answers

What is a limitation of both signature-based and anomaly-based NIDS?

<p>They are only used in network communication (A)</p> Signup and view all the answers

What is a term used to describe vulnerabilities without a fix?

<p>Zero days (C)</p> Signup and view all the answers

What is a potential problem with anomaly-based NIDS?

<p>They rely on the assumption of no malicious activity during training (B)</p> Signup and view all the answers

What motivated DENIC to restrict access to contact information for '.de' domains?

<p>To prevent attackers from abusing contact information (A)</p> Signup and view all the answers

What is the primary assumption behind firewall rules that filter packets based on port numbers?

<p>Particular services listen on specific ports (B)</p> Signup and view all the answers

What is the main argument of advocates of full disclosure?

<p>To inform users of vulnerabilities to assess their risks (A)</p> Signup and view all the answers

What is the primary function of the Domain Name System (DNS)?

<p>To map IP addresses to domain names (A)</p> Signup and view all the answers

What is the purpose of a tunnel service in the context of bypassing firewalls?

<p>To allow users to access the Internet without restrictions (D)</p> Signup and view all the answers

What is the typical timeframe granted to a vendor to release a fix before going public in responsible disclosure?

<p>90 days (A)</p> Signup and view all the answers

What can be inferred from a hostname such as 'webmail05.example.net'?

<p>The server is a mail server (A)</p> Signup and view all the answers

What is the technique called that some firewalls use to check if packets contain data for a specific service?

<p>Deep Packet Inspection (DPI) (C)</p> Signup and view all the answers

What is the purpose of granting a vendor a timeframe to release a fix before going public?

<p>To give vendors the opportunity to investigate the issue thoroughly (D)</p> Signup and view all the answers

What is the primary goal of Certificate Transparency?

<p>To increase transparency in TLS certificate registration (A)</p> Signup and view all the answers

What is the analogy used to argue against DPI?

<p>Comparing packets to postal mail (B)</p> Signup and view all the answers

What happens if a vendor does not fix a vulnerability in the granted timeframe?

<p>The finder goes public with the vulnerability (A)</p> Signup and view all the answers

What can be accomplished with a port scanner such as nmap?

<p>Enumerating all publicly reachable hosts and services (A)</p> Signup and view all the answers

What is a potential consequence of not setting up strict firewall rules?

<p>The system becomes more vulnerable to unauthorized access (C)</p> Signup and view all the answers

Who decides whether to grant a vendor an extension of the embargo?

<p>The finder (A)</p> Signup and view all the answers

What is the limitation of DPI in preventing users from bypassing a firewall?

<p>It cannot entirely prevent users from bypassing a firewall (B)</p> Signup and view all the answers

What is the primary goal of Passive DNS services?

<p>To increase transparency in domain name lookups (B)</p> Signup and view all the answers

What is the purpose of a firewall in the context of perimeter security?

<p>To allow access to specific services (B)</p> Signup and view all the answers

What is the benefit of responsible disclosure, according to its proponents?

<p>It gives vendors the opportunity to investigate the issue thoroughly (B)</p> Signup and view all the answers

What is the main difference between full disclosure and responsible disclosure?

<p>Responsible disclosure notifies the vendor, while full disclosure does not (A)</p> Signup and view all the answers

What is the primary goal of data exfiltration prevention?

<p>To prevent unauthorized data transfer (D)</p> Signup and view all the answers

What is a common problem that can be exploited by attackers using the systems mentioned in the case study?

<p>Information leakage in domain name systems (A)</p> Signup and view all the answers

What is the nature of the cat-and-mouse game between attackers and defenders in the context of data exfiltration prevention?

<p>A constant evolution of attacks and countermeasures (C)</p> Signup and view all the answers

What is a consequence of TLS interception?

<p>Decreased security of encrypted communications (B)</p> Signup and view all the answers

What metrics are used to evaluate the accuracy of a NIDS?

<p>True positive rate, false negative rate, false positive rate, and true negative rate (C)</p> Signup and view all the answers

Why do even accurate NIDS generate many false positives?

<p>Because malicious traffic is much less frequent than normal traffic (B)</p> Signup and view all the answers

What is the base rate in the example of a hypothetical NIDS?

<p>1 out of every 100,000 packets has a malicious payload (B)</p> Signup and view all the answers

What is the consequence of a NIDS with a 99.9% accuracy rate in the example?

<p>The NIDS will generate more false alarms than true alarms (C)</p> Signup and view all the answers

What is the main issue in practical NIDS regarding false alarms and real alarms?

<p>The imbalance is one of the most pressing issues in practical NIDS (A)</p> Signup and view all the answers

Study Notes

Vulnerability Handling

  • An exploit is often developed to take advantage of a vulnerability, and a vendor cannot fix a vulnerability until they are aware of it.
  • Unreported vulnerabilities can remain unfixed for a long time and are referred to as 'zero days' or '0-days'.

Full Disclosure vs. Responsible Disclosure

  • There are two approaches to publishing vulnerabilities: full disclosure and responsible disclosure.
  • Full disclosure involves publicly disclosing the vulnerability without notifying the vendor in advance, which can put pressure on the vendor to release a fix quickly.
  • Responsible disclosure, also known as coordinated disclosure, involves informing the vendor first and giving them a specific timeframe to release a fix before going public.

Responsible Disclosure

  • The typical timeframe for responsible disclosure is 90 days, but vendors may request an extension.
  • The finder of the vulnerability has the discretion to grant an extension or not.
  • Responsible disclosure is not without flaws, and it can increase the effort for system administrators to contact domain owners to resolve problems.

Case Study: Reconnaissance

  • Whois is not the only system that leaks information, and attackers can use other systems like the Domain Name System to gather information.
  • Reverse DNS lookups can be used to look up hostnames given an IP address.
  • Certificate Transparency and Passive DNS can leak sensitive information to attackers, including hostnames of internal systems.
  • Port scanners can be used to enumerate all publicly reachable hosts and services.

Case Study: Perimeter Security via Firewalls

  • Firewalls can be configured to drop all packets that do not match a list of specific port numbers.
  • However, this assumption does not hold, as services can be reconfigured to listen on arbitrary ports.
  • Firewalls can be bypassed using ports that are commonly allowed in the firewall's configuration.
  • Deep Packet Inspection (DPI) can be used to check if packets contain data for a specific service, but it is an open debate whether DPI is an acceptable practice.

Case Study: Network Intrusion Detection Systems

  • Signature-based NIDS detect threats by matching network packets to known attack patterns.
  • Anomaly-based NIDS detect deviations from normal communication patterns.
  • Neither signature-based nor anomaly-based NIDS can detect all threats, as they are limited to network communication.
  • Encrypted traffic cannot be analyzed by NIDS, but this limitation can be overcome by using TLS interception.
  • TLS interception has been called into question, as it allows administrators to eavesdrop on encrypted communication.

Evaluating NIDS Accuracy

  • The accuracy of a NIDS is evaluated using four metrics: true positive rate, false negative rate, false positive rate, and true negative rate.
  • Even very accurate NIDS generate many false positives due to the base rate fallacy.
  • The imbalance between false alarms and real alarms is a significant issue in practical NIDS.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Learn about vulnerabilities, zero-days, and the approaches to publishing vulnerabilities, including full disclosure and responsible disclosure.

More Like This

Use Quizgecko on...
Browser
Browser