3.2 Given a Scenario, apply security principles to secure enterprise infrastructure

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Device Placement

  • Definition: The process of positioning network devices such as firewalls, routers, and switches in a strategic way to optimize security and functionality within the enterprise network.

  • Example: Placing a firewall at the network edge to filter incoming and outgoing traffic, and an intrusion detection system (IDS) within the internal network to monitor unauthorized access attempts.

2
New cards

Security Zones

  • Definition: Segmented areas of a network that enforce varying levels of security based on the sensitivity of the data and services.

  • Example: A DMZ (Demilitarized Zone) houses public-facing servers like web servers and email servers, while internal zones protect sensitive databases with stricter controls.

3
New cards

Attack Surface

  • Definition: The collective sum of all potential vulnerabilities or entry points that could be exploited by an attacker.

  • Example: Reducing the attack surface by disabling unused network ports, decommissioning outdated devices, and enforcing strong password policies.

4
New cards

Connectivity

  • Definition: Refers to the methods and protocols used to enable communication between devices and systems within and outside the network.

  • Example: Using TLS (Transport Layer Security) to encrypt communication between a client and a server.

5
New cards

Failure Modes

  • Definition: The predictable responses of a system when it encounters a fault or failure, which can be designed to prioritize either availability or security.

  • Example: A database server might enter a read-only mode during a failure to ensure data integrity is not compromised.

6
New cards

Fail Open

  • Definition: A failure response where systems remain operational to ensure availability but might compromise security.

  • Example: A door access control system that unlocks all doors during a power outage to allow safe evacuation.

7
New cards

Fail Closed

  • Definition: A failure response where systems shut down to prioritize security over availability.

  • Example: A firewall blocking all network traffic during a failure to prevent unauthorized access.

8
New cards

Active vs. Passive

  • Active: Devices or systems that directly interact with and modify network traffic in real time.

    • Example: An Intrusion Prevention System (IPS) that actively blocks malicious traffic based on predefined rules.

  • Passive: Devices that observe, log, and analyze network traffic without directly altering it.

    • Example: An Intrusion Detection System (IDS) that monitors traffic and sends alerts but does not take action to block it.

9
New cards

Inline vs. Tap/Monitor

  • Inline: Devices placed directly in the path of network traffic, capable of modifying or blocking traffic.

    • Example: A firewall filtering all traffic passing through it.

  • Tap/Monitor: Devices that observe network traffic without being in the direct path.

    • Example: A packet sniffer capturing and analyzing traffic for troubleshooting.

10
New cards

Network Appliances

  • Definition: Specialized devices designed to perform specific functions such as routing, switching, or security tasks.

  • Example: A firewall appliance specifically built to enforce security rules at the network perimeter.

11
New cards

Jump Server

  • Definition: A hardened and secured server used to access and manage devices in sensitive network zones.

  • Example: Using a jump server to access production servers in a data center, requiring multi-factor authentication.

12
New cards

Proxy Server

  • Definition: An intermediary server that acts on behalf of clients to access resources, providing anonymity and security.

  • Example: A company using a proxy server to filter and log employee web traffic.

13
New cards

Intrusion Prevention System (IPS)

  • Definition: A security tool that actively monitors and blocks malicious activities on a network.

  • Example: An IPS blocking an attempted SQL injection attack in real-time.

14
New cards

Intrusion Detection System (IDS)

  • Definition: A passive security tool that monitors and alerts administrators of suspicious activities.

  • Example: An IDS sending an alert about unusual login attempts from a foreign IP address.

15
New cards

Load Balancer

  • Definition: A device that distributes incoming network traffic across multiple servers to ensure availability and reliability.

  • Example: A load balancer spreading web traffic evenly across a cluster of servers during peak times.

16
New cards

Sensors

  • Definition: Devices or software used to collect data about network activity and detect potential security issues.

  • Example: Network sensors detecting unusual traffic patterns indicative of a potential DDoS attack.

17
New cards

Port Security

  • Definition: A feature on switches that restricts device access to specific ports based on MAC addresses to prevent unauthorized access.

  • Example: Enforcing port security to block rogue devices from connecting to a corporate network.

18
New cards

802.1X

  • Definition: A network access control protocol that uses authentication to allow or deny devices access to a network.

  • Example: A corporate Wi-Fi requiring employees to log in with credentials verified by an 802.1X authentication server.

19
New cards

Extensible Authentication Protocol (EAP)

  • Definition: A framework for various authentication methods used in securing network access.

  • Example: EAP-TLS providing certificate-based authentication for Wi-Fi networks.

20
New cards

Firewall Types

  • Definition: Devices that monitor and control traffic based on pre-defined security rules.

  • Example: A stateful firewall tracks ongoing connections and blocks unauthorized traffic.

21
New cards

Web Application Firewall (WAF)

  • Definition: A firewall designed to protect web applications by filtering and monitoring HTTP traffic.

  • Example: A WAF blocking a cross-site scripting (XSS) attack on an e-commerce website.

22
New cards

Unified Threat Management (UTM)

  • Definition: An all-in-one security solution that integrates multiple security functions, like firewall, antivirus, and intrusion detection.

  • Example: A UTM appliance providing firewall, VPN, and anti-malware features in a single device.

23
New cards

Next-Generation Firewall (NGFW)

  • Definition: Advanced firewalls that include features like application awareness and intrusion prevention.

  • Example: An NGFW blocking specific social media applications during work hours.

24
New cards

Virtual Private Network (VPN)

  • Definition: A secure communication channel that encrypts traffic between a client and a server.

  • Example: Employees using a VPN to securely access corporate resources remotely.

25
New cards

Remote Access

  • Definition: The ability to access a network or system from a remote location securely.

  • Example: Using RDP (Remote Desktop Protocol) over a secure VPN for remote IT support

26
New cards

Tunneling

  • Definition: Encapsulating network traffic within another protocol to securely send it across an untrusted network.

  • Example: Using IPsec tunneling to protect sensitive data between branch offices.

27
New cards

Transport Layer Security (TLS)

  • Definition: A cryptographic protocol that ensures secure communication over a network.

  • Example: HTTPS websites use TLS to encrypt data transferred between a browser and a web server.

28
New cards

Internet Protocol Security (IPsec)

  • Definition: A suite of protocols that encrypt and secure IP communications.

  • Example: IPsec securing a site-to-site VPN connection between corporate offices.

29
New cards

Software-Defined Wide Area Network (SD-WAN)

  • Definition: A virtual WAN architecture that uses software to control connectivity and traffic management.

  • Example: SD-WAN dynamically routing traffic over the fastest available path during peak usage.

30
New cards

Secure Access Service Edge (SASE)

  • Definition: A cloud-based framework that combines networking and security services.

  • Example: Using SASE to enforce security policies across remote users accessing corporate resources.

31
New cards

Selection of Effective Controls

  • Definition: The process of choosing and implementing security measures that effectively mitigate risks while supporting business operations.

  • Example: Deploying a combination of firewalls, IDS/IPS, and VPNs to secure enterprise infrastructure.