Network Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/118

flashcard set

Earn XP

Description and Tags

5.1-5.6: Introduction, Physical and Admin Controls, Firewalls, Network Segmentation, Network Monitoring, Defense in Depth. Go look at the study guides on Canvas for the questions at the end of each section.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

119 Terms

1
New cards

Security Controls

Measures implemented to protect the confidentiality, integrity, and availability of data.

2
New cards

Technical Controls

Implemented using computer hardware and software (e.g., firewalls, antivirus software)

3
New cards

Administrative Controls

Implemented using policies, procedures, and user education (e.g., access management policies)

4
New cards

Physical Controls

Manage physical access to computing systems and networks (e.g., security cameras, locked server rooms)

5
New cards

Preventative Controls

Stop attacks before they happen (e.g., firewalls, encryption)

6
New cards

Detective Controls

Identify when attacks occur (e.g. intrusion detection systems)

7
New cards

Corrective Controls

Mitigate the impact of an attack after it occurs (e.g., data backups, incident response plans)

8
New cards

Perimeter Security

Prevents attacks from entering the internal network

9
New cards

Perimeter Security Examples

Firewalls, VPNs, and intrusion prevention systems

10
New cards

Network Security

Secures network infrastructure to prevent lateral movement within a network

11
New cards

Network Security Examples

Network segmentation, access control lists (ACLs)

12
New cards

Host or Endpoint Security

Protects individual devices connected to the network

13
New cards

Host or Endpoint Security Examples

Antivirus software, endpoint detection and response (EDR)

14
New cards

Application Security

Ensures the security of software and applications used on the network

15
New cards

Application Security Examples

Secure coding practices, application firewalls

16
New cards

Data Security

Protects sensitive data from unauthorized access, corruption, or theft

17
New cards

Data Security Examples

Data encryption, access controls, and data masking

18
New cards

Physical Controls

Security measures designed to prevent unauthorized physical access to network infrastructure. Help ensure the safety and integrity of network devices, servers, and data.

19
New cards

Perimeter Security

  • Fencing

  • Cameras

  • Security Guards

20
New cards

Fencing

Establishes a clear boundary around a facility, deterring unauthorized access

21
New cards

Cameras

Monitors activity, providing visual evidence and real-time surveillance

22
New cards

Security Guards

Act as a visible deterrent and provide an immediate response to incidents

23
New cards

Access Control

  • Locks on Doors and Cabinets

  • Card Readers

24
New cards

Locks on Doors and Cabinets

Prevent unauthorized individuals from accessing network devices and servers

25
New cards

Card Readers

Ensure that only authorized personnel can enter restricted areas where sensitive equipment and data are stored

26
New cards

Device Security

Physical locks and tamper-proof cases can prevent theft or tampering of network devices like servers, routers, and switches

27
New cards

Administrative Controls

Involve policies, procedures, and training programs designed to manage human behavior and ensure compliance with security standards.

28
New cards

Security Awareness Training

Educates employees on identifying and responding to security threats like phishing emails, social engineering, and suspicious activity. Promotes a security-conscious culture within the organization.

29
New cards

Security Policies and Procedures

  • Acceptable Use Policy

  • Password Policy

  • Data Security Policy

30
New cards

Acceptable Use Policy (AUP)

Defines how employees can use company resources responsibly

31
New cards

Password Policy

Establishes requirements for creating strong passwords and regularly updating them

32
New cards

Data Security Policy

Outlines how sensitive data should be accessed, stored, and shared

33
New cards

Enforcement and Monitoring

Administrative controls often include auditing and monitoring to ensure compliance with policies. Violations may result in disciplinary actions, further reinforcing adherence to security measures.

34
New cards

Firewall

A security system used to admit or deny traffic into a network or host. Act as a barrier between a trusted network and an untrusted network. Filters network traffic based on predetermined security rules.

35
New cards

Firewall Implementation

  • Can be a standalone physical device

  • Can be software installed on a device

36
New cards

Firewall Filtering Criteria

  • Source/destination IP addresses

  • Logical ports

  • Protocols

  • Application types

37
New cards

Host-Based Firewall

  • Permits/denies traffic into or out of a single device

  • Installed on individual computers

  • Examples: Windows Defender Firewall, UFW (Linux)

38
New cards

Network-Based Firewall

  • Permits/denies traffic into or out of an entire network

  • Typically deployed at network boundaries

  • Examples: CISCO ASA, Palo Alto Networks Firewalls

39
New cards

Stateless Firewall

  • Filters based on packet headers (IP addresses, ports, protocols)

  • Examines each packet in isolation

  • Simple but less secure

  • Limited to header inspection

40
New cards

Stateful Firewall

  • Filters based on the state of active connections

  • Tracks connection state and context

  • Better security through context awareness

  • Can track entire communication sessions

41
New cards

Next-Generation Firewall (NGFW)

  • Combines capabilities of stateless/stateful firewalls with advanced features

  • Includes intrusion prevention, deep packet inspection, application filtering

  • Most comprehensive protection

  • Can inspect encrypted traffic and identify applications

42
New cards

Access Control Lists (ACLs)

Rules set by network administrators that firewalls use to permit or deny network traffic

43
New cards

ACL Implementation

Specified in order of priority (typically top to bottom)

44
New cards

ACL Processing

The first rule that matches the criteria will be executed for the specified data

45
New cards

Components of a Typical ACL Rule

  1. Direction of traffic on an interface

    • Inbound (entering the network)

    • Outbound (leaving the network)

  2. Filtering criteria

    • IP addresses (source/destination)

    • Logical ports

    • Services

    • Applications

  3. Action to take

    • Permit (allow the traffic)

    • Deny (block the traffic

46
New cards

Rule Processing Example

RULE 1: DENY traffic FROM 192.168.1.100 TO ANY on PORT 25 (SMTP)
RULE 2: ALLOW traffic FROM 192.168.1.0/24 TO 10.0.0.5 on PORT 80 (HTTP)
RULE 3: ALLOW traffic FROM ANY TO 10.0.0.6 on PORT 443 (HTTPS)
RULE 4: DENY ALL OTHER TRAFFIC

47
New cards

Allow Lists (Whitelists)

Lists of entities that are granted permission to access a particular resource

48
New cards

Allow List Default Action

Any entity not on the allow list is implicitly denied access

49
New cards

Allow List Security Approach

Proactive security model

50
New cards

Allow List Advantages

  • Provides tighter security control

  • Reduces attack surface

  • Better protection against unknown threats

51
New cards

Allow List Disadvantages

  • May block legitimate entities if they’re unintentionally omitted

  • Can impact resource availability

  • Requires more maintenance to keep updated

52
New cards

Deny Lists (Blacklists)

Lists of entities that are explicitly denied access to a particular resource

53
New cards

Deny List Default Action

Any entity not on the deny list is implicitly allowed access

54
New cards

Deny List Security Approach

Reactive security model

55
New cards

Deny List Advantages

  • Easier to implement initially

  • Less likely to block legitimate access

  • Requires less day-to-day maintenance

56
New cards

Deny List Disadvantages

  • More permissive approach

  • Can lead to illegitimate entities gaining access

  • May impact the confidentiality of data

  • Reactive rather than proactive

57
New cards

Firewall Implementation at Network Perimeter

Protecting the boundary between internal and external networks

58
New cards

Firewall Implementation with Network Segmentation

Dividing networks into security zones

59
New cards

Firewall Implementation for Data Center Protection

Securing server environments

60
New cards

Firewall Implementation for Cloud Security

Protecting cloud-based resources

61
New cards

Firewall Implementation for Remote Access

Securing VPN connections

62
New cards

Firewall Best Practices

  • Implement the principle of least privilege

  • Use a defense-in-depth approach (multiple layers of security)

  • Regularly audit and update firewall rules

  • Document all firewall configurations and changes

  • Test firewall configurations before deployment

  • Monitor firewall logs for suspicious activity

  • Establish a process for rule review and removal of outdated rules

63
New cards

Network Segmentation

The process of dividing a computer network into smaller, isolated segments or subnets. Creates logical or physical boundaries between different parts of a network. Establishes control points for monitoring and restricting network traffic between segments. Implements the principle of least privilege at the network level.

64
New cards

Network Segmentation Basic Concept

Transforms a flat network into a compartmentalized structure where traffic between segments is controlled and monitored.

65
New cards

Network Segmentation Benefits

  • Breach Containment - Prevents attacks from moving laterally throughout the network

  • Attack Surface Reduction - Limits the network resources visible to potential attackers

  • Security Zone Creation - Enables different security policies for different network areas

  • Access Control - Restricts user and device access to only necessary network resources

  • Simplified Compliance - Helps meet regulatory requirements by isolating sensitive data

66
New cards

Network Segmentation Performance Improvements

  • Reduced Network Congestion - Isolates network traffic to relevant segments

  • Improved Speed: Less broadcast traffic means faster communication within segments

  • Better Bandwidth Utilization - Localizes traffic to where it’s needed

  • Efficient Troubleshooting - Easier to identify and resolve network issues within smaller segments

67
New cards

Network Segmentation Operational Benefits

  • Simplified Management - Easier to manage smaller network segments

  • Enhanced Monitoring - More effective visibility into traffic patterns

  • Improved Incident Response - Faster isolation of compromised systems

  • Better Resource Allocation - Optimized network resource distribution

68
New cards

Firewall Zones and Screened Subnets (DMZ)

  • A network segment positioned between public external networks (Internet) and internal private networks

  • Typically designated as a lower security zone than internal networks

  • Houses publicly accessible resources (web servers, email servers, etc.)

  • Keeps public-facing services separated from the internal network

  • Uses firewalls to control traffic flow between zones

69
New cards

Virtual Local Area Networks (VLANs)

  • Uses switches to create logical separations of physically connected devices

  • Devices on different VLANs cannot directly communicate with each other

  • Traffic between VLANs must pass through a Layer 3 device

  • Enables segmentation without changing physical network topology

  • Can group devices by function, department, or security requirements

70
New cards

Subnetting via IP Addressing

  • Divides network into different subnets based on IP addressing schemes

  • Uses subnet masks to define network boundaries

  • Traffic between subnets must pass through a Layer 3 or routing-capable device

  • Provides physical or logical separation of network resources

  • Can be implemented alongside other segmentation techniques

71
New cards

Combined Approaches to Network Segmentation

  • DMZ with firewalls for internet-facing services

  • VLANs for internal logical separation

  • Subnetting for IP-based organization

  • Each approach addresses different security and operational needs

72
New cards

Network Segmentation Planning & Design

  • Network Mapping - Document all network assets and data flows

  • Risk Assessment - Identify critical assets and potential threats

  • Security Requirements - Define security objectives for each segment

  • Segmentation Policy - Create clear policies for inter-segment communication

73
New cards

Segmentation Strategies

  • Group by Function - Separate networks based on server function (database, application, web)

  • Group by Sensitivity - Create segments based on data classification levels

  • Group by Department - Segment based on organizational structure

  • Zero Trust Approach - Verify all connections regardless of source location

74
New cards

Access Control Implementation

  • Default Deny Policies - Block all traffic between segments by default, allowing only necessary communication

  • Access Control Lists (ACLs) - Implement detailed rules for traffic filtering

  • Defense in Depth - Apply multiple security controls at segment boundaries

  • Least Privilege - Grant only necessary access rights between segments

75
New cards

Monitoring and Maintenance

  • Traffic Analysis - Continuously monitor inter-segment network traffic

  • Security Logging - Maintain logs of all traffic crossing segment boundaries

  • Regular Audits - Periodically review segmentation effectiveness

  • Update Policies - Adjust segmentation as network needs evolve

76
New cards

Internet-Facing DMZ

  • Purpose: Public Services

  • Security Level: Lower

  • Example Devices/Services: Web servers, DNS, Email gateways

77
New cards

Internal Services Segment

  • Purpose: Organization-wide services

  • Security Level: Medium

  • Example Devices/Services: Directory services, Internal applications

78
New cards

User Network Segmentation

  • Purpose: Employee workstations

  • Security Level: Medium

  • Example Devices/Services: Desktops, Laptops, Printers

79
New cards

Management Segment

  • Purpose: Network administration

  • Security Level: High

  • Example Devices/Services: Management interfaces, Admin consoles

80
New cards

Protected Data Segment

  • Purpose: Sensitive Information

  • Security Level: Highest

  • Example Devices/Services: Financial databases, PII storage

81
New cards

IoT Segment

  • Purpose: Connected devices

  • Security Level: Isolated

  • Example Devices/Services: Smart devices, Building systems

82
New cards

Network Segmentation in Healthcare

Separate medical devices from patient records systems

83
New cards

Network Segmentation in Finance

Isolate payment processing from general operations

84
New cards

Network Segmentation in Manufacturing

Segment operational technology from IT networks

85
New cards

Network Segmentation in Education

Separate administrative, faculty, and student networks

86
New cards

Network Segmentation in Retail

Isolate point-of-sale systems from corporate networks

87
New cards

Common Challenges with Network Segmentation

  • Complexity - More complex to manage than flat networks

  • Performance Overhead - Potential latency when crossing segment boundaries

  • Resource Requirements - Additional hardware/software needs

  • Legacy Systems - Difficulty integrating older systems into segmented design

88
New cards

Network Monitoring

A critical component of cybersecurity that involves continuously observing network traffic, system behavior, and events to detect security threats, performance issues, and operational anomalies.

89
New cards

Intrusion Detection Systems (IDS)

A security technology that monitors network traffic and system activities for malicious actions or policy violations. Identifies potential security incidents, logs information about them, and reports to administrators

90
New cards

IDS Key Characteristics

  • Monitors and analyzes network traffic to identify suspicious behavior or patterns

  • Generates alerts for system administrators when security incidents are detected

  • Acts as a passive observer that does not modify or block traffic

  • Provides visibility into potential security breaches

  • Can be out-of-band (not directly in traffic path)

  • Minimal to no latency impact

  • Can generate unnecessary alerts

91
New cards

Intrusion Prevention Systems (IPS)

An advanced security technology that not only detects but also takes automated actions to prevent or mitigate security incidents. Identifies and actively responds to potential security threats in real-time.

92
New cards

IPS Key Characteristics

  • Monitors and analyzes network traffic like an IDS

  • Generates alerts for system administrators when security incidents are detected

  • Takes active measures to mitigate and respond to security incidents

  • Can automatically block suspicious traffic, terminate suspicious connections, or take other defensive actions

  • Must be in-line (directly in the traffic path)

  • May introduce slight latency

  • May block legitimate traffic

93
New cards

Network Event Logging

The process of recording network activities, system events, and security incidents. Creates detailed records for analysis, troubleshooting, and forensic investigation.

94
New cards

Key Benefits of Network Event Logging

  • Provides useful information when investigating the causes and impacts of security incidents

  • Helps in early identification of security incidents through regular monitoring

  • Creates an audit trail for compliance and forensic purposes

  • Enables detection of patterns that might indicate ongoing attacks

95
New cards

Network Events Logged

Authentication Events:

  • Successful and failed login attempts

  • Password changes

  • Account lockouts

System Events:

  • System startups and shutdowns

  • Service or application starts and stops

  • System configuration changes

Network Events:

  • Firewall accepts/denies

  • Unusual traffic patterns

  • Connection attempts to restricted services

Security Events:

  • Malware detections

  • Policy violations

  • Privilege escalations

96
New cards

Network Monitoring Architecture Components

  1. Sensors/Agents: Collect data from various points in the network

  2. Collection Systems: Aggregate logs and events from multiple sources

  3. Analysis Engines: Process collected data to identify patterns and anomalies

  4. Alert Systems: Notify administrators of potential issues

  5. Response Systems: Implement automated countermeasures (in IPS)

97
New cards

Network Monitoring Deployment Strategies

Network-Based Monitoring:

  • Monitors traffic at strategic points in the network

  • Less resource-intensive on endpoints

  • May miss encrypted traffic

Host-Based Monitoring:

  • Agents installed on individual systems

  • Can monitor system-level activities

  • More resource-intensive

Hybrid Approach:

  • Combines network and host-based monitoring

  • Provides comprehensive visibility

  • Balances resource usage with coverage

98
New cards

Network Monitoring Best Practices

Establish Baselines:

  • Document normal network behavior

  • Use baselines to identify deviations

Implement Log Management:

  • Centralize log collection

  • Establish log retention policies

  • Ensure timestamp synchronization

Regular Review:

  • Schedule routine log reviews

  • Automate common analysis tasks

  • Look for patterns across multiple data sources

Tuning and Optimization:

  • Reduce false positives

  • Focus on high-value alerts

  • Adjust sensitivity based on threat landscape

Integration with Incident Response:

  • Define clear escalation procedures

  • Automate initial response where appropriate

  • Document lessons learned from incidents

99
New cards

Alert Fatigue

Condition where security personnel become desensitized to alerts due to high volume or frequent false positives

100
New cards

Anomaly Detection

Identifying patterns that do not conform to expected behavior