monitoring measures
Vulnerability testing - Answer Identification of a list of vulnerabilities that can be
prioritised in order of severity.
Penetration testing - Answer A software tool that tests a computer system/network to
identify vulnerabilities that could be exploited by an attacker.
Fuzzing - Answer Used to identify coding errors and security loopholes in software,
operating systems and networks. It involves inputting huge amounts of random data in
attempt to make the system crash.
Security functionality - Answer Used to identify flaws in security mechanisms that are
supposed to protect data and information and protect functionality.
Sandboxing - Answer Test environment that isolates untested code changes to ensure
that any issues are not transmitted to other areas of the system.
Intrusion detection system - Answer Software that monitors computer system/network
for unexpected/malicious activities
Network intrusion detection system - Answer Monitors all inbound and outbound
network activity to identify any suspicious patterns that indicate a cyber attack
Host intrusion detection system - Answer Detects unusual , unauthorised or illegal
activities on a specific device.
Distributed intrusion detection system - Answer Consists of multiple IDSs over a large
network that communicate with each other or a central server.
Anomaly based - Answer Monitors network and system activity and classifies whether
the activity is expected or not.
Signature based - Answer Monitors specific patterns for network traffic or known
instructions used by malware - must be kept up to date and requires regular signature
updates
Honeypot - Answer A computer system set up as a decoy to detect, deflect and even
counteract any unauthorised used of the system.
Intrusion prevention system - Answer proactive detection and prevention against
unwanted intruders e.g.a firewall.