Section 16: Network Segmentation

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/87

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

88 Terms

1
New cards

Firewall

  • A common network security device that acts as a barrier to networks

  • Uses a set of rules to define permitted or denied traffic

  • Types

    • Software/Hardware Based

    • Virtual/Physical devices

    • Host/Network based

2
New cards

Firewall Functions

  • Performs:

    • Network Address Translation (NAT)

    • Port Address Translation (PAT)

  • Can use one public IP and many private IPs

3
New cards

Types of Firewalls (3)

  • Packet Filtering Firewall

  • Stateful Firewall

  • Next-Generation Firewall (NGFW)

4
New cards

Packet Filtering Firewall

  • Permits or denies traffic based on packet headers

  • Uses Access Control Lists (ACLs) for decision-making

  • Limited by rules and may not enable two-way communication effectively

5
New cards

Stateful Firewall

  • Inspects traffic as part of a session and recognizes where the traffic originated

  • Allows incoming traffic that corresponds to outgoing requests

  • Can be exploited in phishing attacks due to session-based nature

    • Combine Packet Filtering AND Stateful firewalls for good security

      • Modern firewalls often support both packet filtering and stateful capabilities

6
New cards

Next-Gen Firewall (NGFW)

  • Conducts deep packet inspection (DPI) for detailed traffic analysis

  • Operates at layers 5,6, and 7 of the OSI model

  • Can be specific to web servers (web application firewall) or for entire networks

7
New cards

Access Control Lists (ACLs)

  • Set of rules assigned to routers or firewalls

  • Permit or deny traffic based on IP/MAC address or port depending on device:

    • Switch - MAC Address

    • Router - IP Address

    • Firewall - IP address or port

  • Criteria

    • Source/destination IP

    • Source/destination port

    • Source/destination MAC

  • Processed from top to bottom

    • Specific rules should be at the top

    • Generic rules should be at the bottom

8
New cards

Unified Threat Management (UTM) System

  • Combines firewall, router, intrusion detection/prevention, malware solutions and other security devices

  • Considered a border device with Next-Gen firewall capabilities

  • Available as physical, virtual, or cloud solutions

9
New cards

Blocking Strategies

  • Block incoming requests from internal or private loopback addresses, multicast IP ranges, and experimental ranges

  • Block incoming requests from protocols that should only be used locally

    • i.e ICMP, DHCP, OSPF, SMB

  • Configure IPv6 to block all traffic or allow only authorized hosts and ports

10
New cards

Explicit Allow

  • Specified in ACLs using “permit” statements

  • Each “permit” statement explicitly allows a specific type of traffic from a specific source to a specific destination

  • Ensure that only specified traffic is allowed

11
New cards

Explicit Deny

  • Statement used to block specific types of traffic

  • Created by changing the “permit” to “deny” in a ACL rule

  • Allow for more precise control over which traffic is blocked

12
New cards

Implicit Deny

  • Statement that is automatically applied at the end of an ACL if no explicit deny statements are present

  • Blocks all traffic that is not explicitly permitted by “permit” statements

  • Allow for more precise control over which traffic is blocked

13
New cards

Role-Based Access Control

  • Defines privileges and responsibilities of administrative users

  • Users are grouped based on roles or job functions

  • Permissions are assigned based on roles (e.g. configuring firewalls, adding/removing users)

14
New cards

Segmentation Zones (3)

  • Trusted Zone

  • Untrusted Zone

  • Screened Subnet

15
New cards

Trusted Zone

  • Local Area Network (LAN), also known as the Inside Zone

  • Represents the corporate intranet

16
New cards

Untrusted Zone

  • Includes the internet and other external networks

  • Outside Zone

  • Traffic from the internet to the trusted zone is typically blocked, except for responses to specific requests from the inside

17
New cards

Screened Subnet

  • A semi-trusted zone between the trusted and untrusted zone

  • Contains devices like web servers and email servers

  • Has restricted access from the untrusted zone and is not fully trusted by the internal network

  • Provides a choke point for network security measures, enhancing protection for hosted servers

    • Firewalls

    • Intrusion detection systems (IDS)

    • Intrusion preventions systems (IPS)

    • Unified threat management (UTM) systems

18
New cards

Screened Subnet to Trusted Zone

  • Traffic from internal to the screened subnet is allowed, but traffic is restricted

  • Return traffic from screened subnet devices is allowed

19
New cards

Screened Subnet to Untrusted Zone

  • Screened subnet devices can access the internet freely

  • Certain inbound ports need to be open for services like email and web hosting

20
New cards

Screened Subnet Functionality

  • Allows hosted servers like emails and webservers to be accessible from both internal and external networks

  • Without the screened subnet, servers hosted inside the network would be inaccessible or less useful to external users

21
New cards

Internet Facing Hosts

  • Hosts or servers that accept inbound connections from the internet

    • i.e. Web server on a screen subnet

22
New cards

Content of Screen Subnet

  • Internet facing servers:

    • Email and web servers

    • Communication servers

    • Proxy servers

    • Remote access servers

    • Public services or extranet capabilities

  • Security Measures

    • Harden devices in the screen subnet

    • Use intrusion detection systems

    • Consider all devices in the screen subnet as untrusted

    • Protect against pivoting attacks from the screen subnet to the internal network

  • Bastion Hosts

23
New cards

Bastion Host

  • A host or server in the screen subnet that is not configured with services that run on the local network

    • Example

      • Email server

      • Web server

      • Remote access server

24
New cards

Jumpbox

  • A hardened server that provides access to other hosts within the screen subnet

  • Purpose

    • Control access to the screen subnet from the internal network

  • Security

    • Should be heavily hardened and protected

  • Management of Jumpbox

    • Can be a physical PC or a virtual machine

    • Should have only the minimum required software

    • Fully hardened and secured to protect against unauthorized access

25
New cards

Content Filtering

  • A network management practice that involves restricting access to certain content, websites, or applications based on specific criteria to:

    • Conserve network bandwidth

    • Comply with legal or organizational policies

    • Prevent exposure to inappropriate or harmful content

26
New cards

Content Filtering Techniques (3)

  • URL Filtering

  • Keyword Filtering

  • Protocol or Port Filtering

27
New cards

URL Filtering

  • Blocks access to specific websites based on their URL

  • Common in organizational settings to prevent access to non-work-related or inappropriate sites

28
New cards

Keyword Filtering

  • Scans webpages for specific keywords or phrases and blocks them

  • Useful for blocking specific content without blocking entire websites

  • Can lead to over-blocking if not configured carefully

29
New cards

Protocol or Port Filtering

  • Blocks certain types of network traffic based on the protocol or port they use

  • Example

    • Blocking specific ports can prevent the use of certain file sharing applications or services

30
New cards

Proxy Servers

  • Act as intermediaries between a user’s device and the internet

  • Manage internet traffic and can be used for various purposes, including content filtering

31
New cards

Types of proxies (3)

  • Web Proxy

  • Reverse Proxy

  • Transparent Proxy

32
New cards

Web Proxy

  • Retrieves web pages from the internet and can be used to bypass content filters

33
New cards

Reverse Proxy

  • Manages incoming internet traffic to an organization, load balancing, improving security, and performance

34
New cards

Transparent Proxy

  • Monitors and filters internet traffic, blocking access to specific websites or content types, and enforcing company policies

35
New cards

Proxy Benefits

  • Filter out malicious traffic and prevent unauthorized access, improving cybersecurity

  • Hide user’s IP address, preserving anonymity and privacy

  • Block access to specific websites or content types, enforcing company policies

  • Cache frequently accessed resources, improving performance

36
New cards

Internet of Things (IoT)

  • A global network of appliances and personal devices equipped with sensors, software, and network connectivity to report state and configuration data

37
New cards

Types of IoT Devices (5)

  • Building and Home Automation Systems

  • IP Video Systems

  • Audio Visual Systems

  • Physical Access Control Systems

  • Scientific and Industrial Equipment

38
New cards

Building and Home Automation Systems

  • Manage:

    • Lighting

    • HVAC

    • Water

    • Security systems

39
New cards

IP Video Systems

  • Provide remote collaboration using video teleconference suites

40
New cards

Audio Visual Systems

  • Stream live video productions and control multiple displays

41
New cards

Physical Access Control Systems

  • Determine access into secure areas

    • Proximity readers

    • Access control systems

    • Biometric readers

42
New cards

Scientific and Industrial Equipment

  • Found in hospitals, factories, and laboratories

  • Allows centralized monitoring and management

43
New cards

IoT Device Best Practices

  • Segregation

    • Place IoT devices on their own network, physically or logically separated from the business network

  • Security

    • Ensures devices are properly security enabled and receive security patches

  • Power

    • Provide power using Power over Ethernet (PoE) or battery power supply

44
New cards

Categories of IoT Components (4)

  • Hub and Control System

  • Smart Devices

  • Wearables

  • Sensors

45
New cards

Hub and Control System

  • Central point of communication for automation and control

46
New cards

Smart Devices

  • Endpoints that connect to the hub for automation

47
New cards

Wearables

  • IoT devices that are designed as accessories that can be worn, such as smart watches and fitness trackers

48
New cards

Sensors

  • Measure various parameters like temperature, sound, motion, etc.

49
New cards

IoT Security Considerations

  • Understand endpoints

    • Each new device brings new vulnerabilities, so understand and secure them

  • Track and manage devices

    • Carefully manage device connections and configurations

  • Patch vulnerabilities

    • Apply patches when available, and manage residual risks

  • Conduct tests and evaluations

    • Evaluate devices using penetration testing techniques

  • Change default credentials

    • Change default usernames and passwords before deployment

  • Use encryption

    • Encrypt data sent and received by IoT devices

  • Segment IoT devices

    • Place IoT devices in their own VLAN and subnet to prevent interference

50
New cards

Information Technology (IT)

  • Focuses on standard computers, servers, networks, and cloud platforms

51
New cards

Operational Technology (OT)

  • A communications network that is designed to implement an industrial control system, rather than traditional business and data networking systems

  • Deals with controlling machinery and processes in the physical world

52
New cards

Industrial Control System (ICS)

  • Provides workflow and process automation by controlling machinery using embedded devices

  • Heavily used to control real world devices

  • Interconnected ICSs can form a Distributed Control System (DCS)

  • Prioritizes availability and integrity over confidentiality (CIA triad in OT)

    • Unlike the CIA triad in IT where confidentiality is often more emphasized

  • Fieldbus

  • Programmable Logic Controllers (PLCs)

  • Human Machine Interfaces (HMIs)

53
New cards

Fieldbus

  • A communication technology used in OT to link Programmable Logic Controllers (PLCs) together

54
New cards

Programmable Logic Controllers (PLCs)

  • Digital computers used in industrial settings for automation and are programmed using Human Machine Interfaces (HMIs)

55
New cards

Human Machine Interfaces (HMIs)

  • A local control panel or a piece of software running on a regular computer that will act as the input to the PLCs and the output for the entire system

56
New cards

Supervisory Control and Data Acquisition (SCADA)

  • A type of ICS used to manage large-scale, multi-site devices and equipment spread over a geographic region

  • Network made up of interconnected ICS/DCS plants using wide are network (WAN) connections, such as cellular, microwave, satellite, fiber, or VPN based WAN

  • Often operated with software running on ordinary systems like Windows or Linux

57
New cards

Bring Your Own Device (BYOD) Policy

  • Policy allowing employees to use their personal devices (laptops, tablets, phones) for work purposes

    • Security Issues

      • Introducing vulnerabilities from personal devices, potential for malware transfer to work network

    • Data Ownership

      • Concerns about who owns the data on personal devices, distinguishing between personal and business data

58
New cards

Storage Segmentation

  • Separating personal and company data on the same device

  • Can be achieved technologically or procedurally

59
New cards

Mobile Device Management (MDM)

  • Centralized software for remote administration and configuration, updating devices, enforcing policies

60
New cards

Choose Your Own Device (CYOD)

  • Employees choose from a selection of supported devices, organization provides and manages the device

  • Benefits of CYOD

    • Allows for:

      • Installation of MDM

      • Enforcing technical policies

      • Preventing data loss

      • Controlling device features

61
New cards

Considerations for Organizations on BYOD

  • Security Policy

    • Organizations must decide on a mobile device security policy that suits their needs

  • Choose between BYOD and CYOD based on security, cost, and control considerations

62
New cards

Concept of Zero Trust

  • Modern approach to cybersecurity due to sophisticated threats

  • Traditional strategies focused on strong perimeter defense like castle walls

    • Ineffective against modern threats due to de-perimeterization

63
New cards

De-perimeterization

  • Protect systems and data using encryption, secure protocols, and host-based protection

  • Allows cost reduction, global business transactions, and increased agility

  • Resulted from cloud migration, remote work, mobile tech, wireless networks, outsourcing

64
New cards

Zero Trust Principles

  • Trust nothing, verify everything

  • Verify every device, user, and transaction regardless of origin

  • Addresses threats from inside and outside networks

65
New cards

Zero Trust Architecture (2)

  • Control Plane

  • Data Plane

66
New cards

Control Plane

  • Defines, manages, and enforces access policies

    • Elements

      • Adaptive Identity

        • Real-time validation based on behavior, device, and location

      • Threat Scope Reduction

        • Limiting user access to minimize attack surface

      • Policy-driven Access Control

        • Enforcing access based on roles and responsibilities

      • Secured Zones

        • Isolated environments for sensitive data access

67
New cards

Data Plane

  • Ensures execution of policies

  • Components

    • Subject System

      • Individual or entity seeking access

    • Policy Engine

      • Cross-references access requests with predefined policies

    • Policy Administrator

      • Establishes and manages access policies

    • Policy Enforcement Point

      • Executes access decisions

68
New cards

Virtual Private Network (VPN)

  • Extends a private network across a public network, allowing users to send and receive data securely as if their devices were directly connected to the private network

  • Uses tunneling protocols to establish a secure connection over the public internet

69
New cards

Types of VPNs (3)

  • Site-to-Site

  • Client-to-Site

  • Clientless

70
New cards

Site-to-Site VPN

  • Connects two offices or sites

  • Provides a cost-effective alternative to dedicated lease lines

71
New cards

Client-to-Site VPN

  • Connects a single remote user to a corporate network, enabling remote work or telecommunicating

72
New cards

Clientless VPN

  • Creates a secure remote access VPN tunnel using a web browser, without requiring software or hardware clients

  • Tunneling protocols (HTTPS Connection)

    • Secure Socket Layer (SSL)

      • Provides cryptography and reliability using the upper layers of the OSI model (Layers 5,6, and 7)

      • Outdated and less secure

    • Transport Layer Security (TLS)

      • Provides secure web browsing over HTTPS

      • More updated than SSL

    • Both SSL and TLS use TCP

      • Can slow down connection due to more overhead

      • Datagram Transport Layer Security (DTLS)

        • UDP version of TLS

        • Provides same level of security as TLS

        • Operates faster due to less overhead inside UDP protocol

        • Excellent choice for video streaming and VoIP over secure and encrypted tunnels

73
New cards

VPN Configuration for Site-to-Site and Client-to-Site (2)

  • Full-Tunnel

  • Split-Tunnel

74
New cards

Full-Tunnel

  • Routes and encrypts all traffic through the VPN connection, making the remote user part of the headquarters

  • Better for untrusted networks*

    • i.e Coffee shops

75
New cards

Split Tunnel

  • Divides traffic, routing and encrypting traffic bound for headquarters over the VPN while sending other traffic directly to the internet

  • Offers better performance but may be less secure

76
New cards

Layer 2 Tunneling Protocol (L2TP)

  • A very early VPN invented in the 80s

  • Lacks security like encryption

  • Needs to be combined with an extra encryption layer for protection

77
New cards

Layer 2 Forwarding (L2F)

  • Developed by Cisco

  • Provides a tunneling protocol for the P2P protocol (PPP)

  • Lacks native security and encryption

78
New cards

Point-To-Point Tunneling Protocol (PPTP)

  • Support dial-up networks

  • Lacks native security except when used with Windows

79
New cards

Modern VPNs

  • IP Security (IPsec)

    • Provides authentication and encryption of packets to create a secure communication path between two computers

80
New cards

Telnet

  • Port 23

  • Sends text-based commands to remote devices

  • Sends data in plain-text, so it is not secure for sensitive information

81
New cards

Secure Shell (SSH)

  • Port 22

  • Encrypts data sent between client and server

  • Provides better security compared to Telnet

  • Always use SSH for configuring network devices

82
New cards

Remote Desktop Protocol (RDP)

  • Port 3389

  • Developed by Microsoft for graphical interface remote connections

  • Useful for remotely accessing Windows servers or client machines

  • Provides a Graphical User Interface (GUI) for remote control

  • Uses tunneling to secure connections

83
New cards

Remote Desktop Gateway (RDG)

  • A Windows server that creates secure connections to servers via RDP

  • Uses SSL or TLS protocols to encrypt data

  • Security features

    • Creating encrypted tunnels like a VPN

    • Controlling access to network resources based on permissions and group roles

    • Maintaining and enforcing authorization policies

    • Monitoring the status of the gateway and any RDP connections passing through that gateway

84
New cards

Virtual Network Computing (VNC)

  • Port 5900

  • Designed for thin client architectures and Virtual Desktop Infrastructure (VDI)

  • Cross-Platformed

    • Linux

    • OS X

    • Windows

  • Allows remote access with a graphical interface

85
New cards

Virtual Desktop Infrastructure (VDI)

  • Hosts a desktop environment on a centralized server

  • Runs a desktop image within a virtual machine for end-user access

  • Also known as Desktop as a Service (DAS) in cloud computing

86
New cards

In-Band Management

  • Uses Telnet or SSH over the network

87
New cards

Out-of-band Management

  • Uses a separate network for device configuration

  • Provides additional security by separating data networks from management networks

88
New cards

Application Programming Interface (API)

  • Set of protocols and routines for building and interacting with software applications

  • Intermediary between different systems for communication

  • Allows for:

    • Automated administration

    • Management

    • Monitoring of Apps/Services

  • Built using Representational State Transfer (REST) or Simple Object Access Protocol (SOAP)

  • Allows for direct integration of different third-party applications