3.2 Security principles to secures enterprise infrastructure.

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Device Placement (Infrastructure consideration)

Strategic positioning of devices for protection and efficiency

Example: Placing firewalls at the network perimeter to filter traffic

2
New cards

Security Zones (Infrastructure consideration)

Diving networks into zones based on trust levels

Example: DMZ for public facing servers, internal zone for employes

3
New cards

Attack Surface (Infrastructure consideration)

All potential points where an attacker could exploit

Example: Reducing exposed ports to minimize surface

4
New cards

Connectivity (Infrastructure consideration)

Control and monitoring of network connections

Example: Restricting devices to necessary VLANs only

5
New cards

Fail open (Infrastructure consideration)

System that allows access when it fails (less secure)

Example: A firewall crashing , allows all traffic to go through

6
New cards

Fail Closed (Infrastructure consideration)

System Blocks access when it fails (more secure)


Example: Firewall failure blocks all traffic to prevent breach

7
New cards

Active Device (Device attribute)

Takes direction action like blocking threats

Example: IPS blocks suspicious activity in real time

8
New cards

Passive Devices (Device attribute)

Monitors traffic without taking action

Example: IDS logs but doesnt stop a port scan

9
New cards

Inline (Device attribute)

Traffic flows through the device
Example: Firewall inspects all packets before allowing entry

10
New cards

Tap/Monitor (Device attribute)

Observes mirrored traffic

Example: IDS passively watches packets on a span port

11
New cards

Jump Server (network appliances)

Mediated access point for critical systems, like a guard or a bouncer before granting access

Example: Admins access servers only via a jumpbox

12
New cards

Proxy Server (network appliances)

Middle layer between users and web

Example: Proxy filters inappropriate content and logs activity

13
New cards

IPS/IDS (network appliances)

Detects or prevents network threats (Intrusion detective/prevention system)

Example: IPS blocks malware payload or IDS logs reconnaissance

14
New cards

Load Balancer (network appliances)

Distributes load across multiple servers

Example: Balances request between two data centers

15
New cards

Sensors (network appliances)

Capture and report on security events

Example: Netflow sensor detects traffic spikes

16
New cards

Port Security

Restricts access based on MAC

Example: Switch blocks unknown device on secure port

17
New cards

EAP ( Port Security, Extensible Authentication Protocol)

Authentication Framework for network access

It is used in enterprise WIFI logins.

18
New cards

802.1x ( Port Security )

Network access control at port level

User must log in to access corporate LAN

19
New cards

Web Application Firewall, WAF (Firewall Types)

Protects web apps from malicious input

Example: WAF blocks XSS attacks on web login

20
New cards

Unified Threat Management, UTF (Firewall Types)

All in one security device

It provides ffirewall, antivirus, and web filter all in one.

21
New cards

Next Generation Fire wall, NGFW (Firewall Types)

Advanced firewall with deep inspection

Example, a NGFW can block app layer attacks like command injection.

22
New cards

Layer 4 Transport Layer (Firewall Type)

Manages network traffic based on information in the packet of the header, like Transport, IP addresses and port layer info.

Example: Block all traffic to port 80

23
New cards

Layer 7 Application type (Firewall Type)

Examines and filters traffic based on actual content and type of app Application content, its advanced and precise

Example: Block malware uploads and filters URL

24
New cards

VPN (Secure Communication/access)

Creates encrypted tunnel over the internet,

Example: remote staff uses VPN to reach company files

25
New cards

Remote Access (Secure Communication/access)

Securely connects users from afar (can use VPN)

Example: Remote staff use VPN to reach company files

26
New cards

Tunnelling (Secure Communication/access)

Wraps traffic inside another protocol

Example: TLS over HTTP encrypts browser traffic

27
New cards

IPSec (Secure Communication/access)

Encrypts internet communications

Internet protocol security

Example: IPSec VPN between headquarters and branch

28
New cards

SD-WAN (Secure Communication/access)

Smart routing and encryption for WANs

Software defined wide area network

Example: Prioritizes VoIP traffic over secure tunnel.

29
New cards

SASE (Secure Communication/access)

Cloud Delivered, security for remote users

Secure access service edge.

Example: Applies firewalls and DLP to work-from-home users

30
New cards

Selection of effective controls

Choosing controls suited to risks and system

Example: Using NGFW for app layer threats vs. basic firewall