Lesson 9 Implementing Secure Network Designs

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key terms from Lesson 9: Implementing Secure Network Designs.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

CIA Triad

Confidentiality, Integrity, and Availability—the core properties guiding secure information systems and networks.

2
New cards

Secure Network Design

An architecture that provisions assets and services to meet CIA and reduces vulnerabilities in network topology.

3
New cards

PIN (Places in Network)

Cisco SAFE concept referring to types of network locations, such as campus networks, branch offices, data centers, and the cloud.

4
New cards

Cisco SAFE

Cisco's framework for secure network design using PINs and secure domains.

5
New cards

Internet Edge

Locations at the network boundary that connect to the Internet and untrusted networks.

6
New cards

WAN

Wide Area Network; connects distant locations beyond a single LAN.

7
New cards

Secure Domains

Categories of security controls in SAFE, including threat defense, segmentation, security intelligence, and management.

8
New cards

Single Point of Failure

A vulnerability where one component's failure can disrupt or stop the entire service.

9
New cards

Complex Dependencies

Situations where services rely on many systems; cascaded failures risk overall performance.

10
New cards

Availability over Confidentiality/Integrity

Shortcut temptation to quickly restore service, risking long-term security.

11
New cards

Documentation/Change Control

Procedures to document and authorize changes to network assets and configurations.

12
New cards

Perimeter Security

Security controls at the network edge; risk if networks are flat and unsegmented.

13
New cards

Flat Network

A network where any host can reach any other host, reducing segmentation.

14
New cards

VLAN

Virtual LAN; Layer 2 segmentation creating separate broadcast domains.

15
New cards

Layer 2

Data Link layer; switches forward frames using MAC addresses and VLANs.

16
New cards

MAC Address

48-bit hardware address assigned to a network interface, used at Layer 2.

17
New cards

Switch

Device that forwards frames between nodes at Layer 2, often creating VLANs.

18
New cards

Wireless Access Point (WAP)

Bridge between wired networks and wireless clients; operates at Layer 2.

19
New cards

Layer 3

Network layer; routing decisions based on IP addresses.

20
New cards

Router

Device that forwards packets between networks using IP addresses.

21
New cards

Firewall

Filters traffic with ACLs and policies, operating at Layer 3 or higher.

22
New cards

Load Balancer

Distributes traffic across servers or segments to improve performance and availability.

23
New cards

DNS

Domain Name System; resolves hostnames to IPs; a key name-resolution service.

24
New cards

ARP

Address Resolution Protocol; maps IP addresses to MAC addresses via requests/replies.

25
New cards

IPv4

32-bit IP addressing with dotted-decimal notation and subnet masks.

26
New cards

IPv6

128-bit IP addressing with hierarchical structure and a 64-bit host ID at the end.

27
New cards

Subnet

Subdivision of an IP network defined by a prefix or subnet mask.

28
New cards

Broadcast Domain

A network segment where broadcast frames are delivered; often per VLAN.

29
New cards

East-West Traffic

Data flows between servers within a data center or cloud environment.

30
New cards

DMZ

Demilitarized Zone; a network segment exposing Internet-facing services while isolating the internal network.

31
New cards

Bastion Host

A hardened host in a DMZ with minimal services, used as a proxy or gateway.

32
New cards

Intranet

Private, trusted network owned/controlled by the organization.

33
New cards

Extranet

Semi-trusted network for partners or customers requiring authentication.

34
New cards

Internet/Guest Zone

Zone permitting anonymous or mixed access by untrusted hosts.

35
New cards

Rogue Access Point

Unauthorized AP that can enable eavesdropping or MitM attacks.

36
New cards

Evil Twin

Rogue AP mimicking a legitimate AP to deceive users and capture credentials.

37
New cards

802.1X

Port-based network access control; authenticates devices before enabling a network port.

38
New cards

NAC (Network Access Control)

Framework for enforcing health/policy requirements before network access is granted.

39
New cards

Posture Assessment

Checking a device's health (antivirus, patches, firewall) against a policy.

40
New cards

PAC (Protected Access Credential)

Credential used by EAP-FAST to provision user credentials securely.

41
New cards

WPA2

Wi‑Fi Protected Access 2; uses AES-CCMP encryption for wireless security.

42
New cards

WPA3

Wi‑Fi Protected Access 3; SAE-based authentication and improved security features.

43
New cards

SAE (Simultaneous Authentication of Equals)

PAKE-based handshake used in WPA3 for secure key exchange.

44
New cards

WPS (Wi-Fi Protected Setup)

An easy setup method designed to simplify connecting devices to a wireless network, often by using an 8-digit PIN. However, it is highly vulnerable to brute-force attacks because its PIN verification is split into two halves, drastically reducing the number of possible combinations and making it susceptible to quick cracking. Due to this significant security flaw, WPS is strongly not recommended for enterprise or any secure network environments.

45
New cards

DPP / Easy Connect

Device Provisioning Protocol; uses QR/NFC for secure Wi‑Fi provisioning, replacing WPS in many cases.