Module 3 Part 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Enterprise Network Architecture

The design and structure of a network that aims to efficiently move data while ensuring compliance with organizational security policies.

2
New cards

Zone Diagram

A logical network diagram that results from a secure network design process, illustrating how data moves within the network in compliance with organizational policies.

3
New cards

Security Zones

Logical entities containing one or more tiers that segregate and separate parts of the network, allowing for the definition and application of policies for risk mitigation at a zone level.

4
New cards

Tiers

Logical sets of systems collectively addressed as one, based on the function they provide, such as application servers or database clusters, designed for reliability, scalability, or redundancy.

5
New cards

Public Zone

A network area where corporate-owned systems available to the general public reside, lacking strict security controls and accessible externally.

6
New cards

Private Zone

A network area behind a firewall containing systems owned and controlled by the organization, allowing for the imposition of security standards and controls.

7
New cards

Host

Systems within the network, assigned to specific tiers within the private zone to facilitate the organization's control and management of its assets.

8
New cards

Zone Assignment

Process of assigning each tier to a specific zone based on restrictions and requirements.

9
New cards

Trust Level

The degree of confidence in the security and integrity of data within a specific zone.

10
New cards

Perimeter Zone

Area directly exposed to the public zone, containing systems like public-facing websites and communication devices.

11
New cards

Internal Zone

Area where internal systems and applications reside, including web applications, traditional applications, and data storage.

12
New cards

Core Zone

Central zone in enterprise computing, encompassing infrastructure, internet, application, and data zones.

13
New cards

Source Zone

Originating zone of data transmission.

14
New cards

Destination Zone

Receiving zone of data transmission.

15
New cards

Port Number

Specific numerical identifier for communication endpoints in a network.

16
New cards

Protocol

Set of rules governing data exchange between devices.

17
New cards

Transport Layer Protocol

Protocol responsible for end-to-end communication in a network.

18
New cards

Tiers

Different systems like Oracle, SQL, and IBM's DB categorized based on their level within the data zone.

19
New cards

PeopleSoft

Application used for HR services in the university.

20
New cards

SIS (Student Information System)

System where student records are maintained.

21
New cards

Quality

Financial ERP system used for managing university finances.

22
New cards

Laptops and Desktops

Client devices, with laptops posing security risks due to mobility.

23
New cards

Availability

Measure of system uptime, crucial for business continuity.

24
New cards

Downtime

Unplanned system unavailability, measured in a "nines" rating.

25
New cards

Default Deny

Security principle where only explicitly allowed traffic passes through the system.

26
New cards

Firewall

Device that permits permitted data and blocks unauthorized traffic.

27
New cards

Network Segments

Connectivity that links switches, routers, and physical systems together.

28
New cards

Logical Segments

Virtual lines defining network connectivity.

29
New cards

Physical Segments

Traditional LANs connecting physical systems.

30
New cards

Zone Diagramming

Logical way of creating network architectures with defined zones, tiers, and segments.

31
New cards

Microsoft Documentation

Basis for creating network architectures in a structured and secure manner.