Page 1213 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1213

persistent threats (APTs) sponsored by nation-states. APTs are
               discussed in several chapters of this book, such as Chapter 14. One of

               the ways these attacks are detected is with egress monitoring, or
               monitoring the flow of traffic out of a network.


               Intrusion Detection and Prevention Systems

               The previous section described many common attacks. Attackers are
               constantly modifying their attack methods, so attacks typically morph

               over time. Similarly, detection and prevention methods change to
               adapt to new attacks. Intrusion detection systems (IDSs) and intrusion
               prevention systems (IPSs) are two methods organizations typically
               implement to detect and prevent attacks.

               An intrusion occurs when an attacker can bypass or thwart security
               mechanisms and gain access to an organization’s resources. Intrusion
               detection is a specific form of monitoring that monitors recorded

               information and real-time events to detect abnormal activity
               indicating a potential incident or intrusion. An intrusion detection
               system (IDS) automates the inspection of logs and real-time system
               events to detect intrusion attempts and system failures. Because an
               IPS includes detection capabilities, you’ll often see them referred to as
               intrusion detection and prevention systems (IDPSs).


               IDSs are an effective method of detecting many DoS and DDoS
               attacks. They can recognize attacks that come from external
               connections, such as an attack from the internet, and attacks that
               spread internally such as a malicious worm. Once they detect a
               suspicious event, they respond by sending alerts or raising alarms. In
               some cases, they can modify the environment to stop an attack. A
               primary goal of an IDS is to provide a means for a timely and accurate
               response to intrusions.




                             An IDS is intended as part of a defense-in-depth security


                  plan. It will work with, and complements, other security
                  mechanisms such as firewalls, but it does not replace other security
                  mechanisms.
   1208   1209   1210   1211   1212   1213   1214   1215   1216   1217   1218