Module 3 Part 2

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 30

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

31 Terms

1

Enterprise Network Architecture

The design and structure of a network that aims to efficiently move data while ensuring compliance with organizational security policies.

New cards
2

Zone Diagram

A logical network diagram that results from a secure network design process, illustrating how data moves within the network in compliance with organizational policies.

New cards
3

Security Zones

Logical entities containing one or more tiers that segregate and separate parts of the network, allowing for the definition and application of policies for risk mitigation at a zone level.

New cards
4

Tiers

Logical sets of systems collectively addressed as one, based on the function they provide, such as application servers or database clusters, designed for reliability, scalability, or redundancy.

New cards
5

Public Zone

A network area where corporate-owned systems available to the general public reside, lacking strict security controls and accessible externally.

New cards
6

Private Zone

A network area behind a firewall containing systems owned and controlled by the organization, allowing for the imposition of security standards and controls.

New cards
7

Host

Systems within the network, assigned to specific tiers within the private zone to facilitate the organization's control and management of its assets.

New cards
8

Zone Assignment

Process of assigning each tier to a specific zone based on restrictions and requirements.

New cards
9

Trust Level

The degree of confidence in the security and integrity of data within a specific zone.

New cards
10

Perimeter Zone

Area directly exposed to the public zone, containing systems like public-facing websites and communication devices.

New cards
11

Internal Zone

Area where internal systems and applications reside, including web applications, traditional applications, and data storage.

New cards
12

Core Zone

Central zone in enterprise computing, encompassing infrastructure, internet, application, and data zones.

New cards
13

Source Zone

Originating zone of data transmission.

New cards
14

Destination Zone

Receiving zone of data transmission.

New cards
15

Port Number

Specific numerical identifier for communication endpoints in a network.

New cards
16

Protocol

Set of rules governing data exchange between devices.

New cards
17

Transport Layer Protocol

Protocol responsible for end-to-end communication in a network.

New cards
18

Tiers

Different systems like Oracle, SQL, and IBM's DB categorized based on their level within the data zone.

New cards
19

PeopleSoft

Application used for HR services in the university.

New cards
20

SIS (Student Information System)

System where student records are maintained.

New cards
21

Quality

Financial ERP system used for managing university finances.

New cards
22

Laptops and Desktops

Client devices, with laptops posing security risks due to mobility.

New cards
23

Availability

Measure of system uptime, crucial for business continuity.

New cards
24

Downtime

Unplanned system unavailability, measured in a "nines" rating.

New cards
25

Default Deny

Security principle where only explicitly allowed traffic passes through the system.

New cards
26

Firewall

Device that permits permitted data and blocks unauthorized traffic.

New cards
27

Network Segments

Connectivity that links switches, routers, and physical systems together.

New cards
28

Logical Segments

Virtual lines defining network connectivity.

New cards
29

Physical Segments

Traditional LANs connecting physical systems.

New cards
30

Zone Diagramming

Logical way of creating network architectures with defined zones, tiers, and segments.

New cards
31

Microsoft Documentation

Basis for creating network architectures in a structured and secure manner.

New cards
robot