3.0 CompTIA Security+ SY0-701 Security Architecture

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 140

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

141 Terms

1

cloud responsibility matrix

Documentation listing which security and management tasks are the responsibility of the cloud provider and which are the responsibility of the cloud consumer.

IaaS, PaaS, SaaS, etc.

-Who is responsible for security?

Security should be well-documented

-Most cloud providers provide a matrix of responsibilities

-Everyone knows up front

These responsibilities can vary

-Different cloud providers

-Contractual agreements

<p>Documentation listing which security and management tasks are the responsibility of the cloud provider and which are the responsibility of the cloud consumer.</p><p>IaaS, PaaS, SaaS, etc.</p><p>-Who is responsible for security? </p><p>Security should be well-documented</p><p>-Most cloud providers provide a matrix of responsibilities </p><p>-Everyone knows up front</p><p>These responsibilities can vary</p><p>-Different cloud providers</p><p>-Contractual agreements </p>
New cards
2

Hybrid considerations

Hybrid cloud

-More than one public or private cloud

-This adds additional complexity

Network protection mismatches

-Authentication across platforms

-Firewall configurations

-Server settings

Different security monitoring

-Logs are diverse and cloud-specific

Data leakage

-Data is shared across the public Internet

New cards
3

Third-party vendors in the cloud

You, the cloud provider, and third parties

-Infrastructure technologies

-Cloud-based appliances

Ongoing vendor risk assessments

-Part of an overall vendor risk management policy

Include third-party impact for incident response

-Everyone is part of the process

Constant monitoring

-Watch for changes in unusual activity

New cards
4

Infrastructure as code (IaC)

Describe an infrastructure

-Define servers, networks, and applications as code

Modify the infrastructure and create versions

-The same way you version the application code

Use the description (code) to build other application instances

-Build it the same way every time based on the code

An important concept for cloud computing

-Build a perfect version every time

New cards
5

Serverless Architecture (FaaS)

Function as a Service (FaaS)

-Applications are separated into individual, autonomous functions

-Remove the operating system from the equation

Developer still crates the server-side logic

-Runs in a stateless compute container

It may be event-triggered and ephemeral

-May only run for one event

Managed by a third-party

-All OS security concerns are at the third-party

New cards
6

Microservices and APIs

Monolithic applications

-One big application that does everything

The application contains all decision-making processes

-User interface

-Business logic

-Data input and output

Code challenges

-Large codebase

-Change control challenges

New cards
7

Application Programming Interfaces (API)

API is the "glue" for the microservices

-Work together to act as the application

Scalable

-Scale just the microservices you need

Resilient

-Outages are contained

Security and Compliance

-Containment is built-in

New cards
8

Network infrastructure

Physical isolation

-Air-gapped

Logical segmentation

Software-defined networking (SDN)

New cards
9

Physical isolation

Devices are physically separate

-The air gap between Switch A and Switch B

Must be connected to provide communication

-Direct connect, or another switch or router

Web servers in one rack

-Database servers on another

Customer A on one switch, customer B on another

-No opportunity for mixing data

New cards
10

Physical segmentation

Separate devices

-Multiple units, separate infrastructure

<p>Separate devices</p><p>-Multiple units, separate infrastructure</p>
New cards
11

Logical Segmentation with VLANs

Virtual Local Area Networks (VLANs)

-Separated logically instead of physically

-Cannot communicate between VLANs without a layer three device/ routers

New cards
12

Software Defined Networking (SDN)

Networking devices have different functional planes of operation

-Data, control, and management planes

Split the functions into separate logical units.

-Extend the functionality and management of a single device

-Perfectly built for the cloud

Infrastructure layer/ Data plane

-Process the network frames and packets

-Forwarding, trunking, encrypting, NAT

Control layer/ control plane

-Manages the actions of the data plane

-Routing tables, session tables, NAT tables

-Dynamic routing protocol updates

Application layer/ Management plane

-Configure and manage the device

-SSH, browser, API

<p>Networking devices have different functional planes of operation</p><p>-Data, control, and management planes</p><p>Split the functions into separate logical units.</p><p>-Extend the functionality and management of a single device</p><p>-Perfectly built for the cloud </p><p>Infrastructure layer/ Data plane</p><p>-Process the network frames and packets</p><p>-Forwarding, trunking, encrypting, NAT</p><p>Control layer/ control plane</p><p>-Manages the actions of the data plane</p><p>-Routing tables, session tables, NAT tables</p><p>-Dynamic routing protocol updates </p><p>Application layer/ Management plane </p><p>-Configure and manage the device</p><p>-SSH, browser, API</p>
New cards
13

SDN data flows

knowt flashcard image
New cards
14

SDN Security

Due to SDN's plane separation, security must be implemented for each interface. After designing the SDN architecture, security methods should be considered. The chosen security solution must be secure, scalable, and efficient

New cards
15

On-premises security

Customize your security posture

-Full control when everything is in-house

On-site IT team can manage security better

-The local team can ensure everything is secure

-A local team can be expensive and difficult to staff

The local team maintains uptime and availability

-System checks can occur at any time

-No phone call for support

Security changes can take time

-New equipment, configurations, and additional costs

New cards
16

Centralized vs. Decentralized

Authority can either be focused at the top levels, or it can be delegated to lower-level staff

Most organizations are physically decentralized

-Many locations, cloud providers, operating systems, etc.

It is challenging to manage and protect so many diverse systems

-Centralize the security management

A centralized approach

-Correlated alerts

-Consolidated log file analysis

-Comprehensive system status and maintenance/ patching

It is not perfect

-Single point of failure, potential performance issues

New cards
17

Application containerization

Container

-Contains everything you need to run an application

-Code and dependencies

-A standardized unit of software

An isolated process in a sandbox

-Self-Contained

-Apps can not interact with each other

Container image

-A standard for portability

-Lightweight, uses the host kernel

-Secure separation between applications

New cards
18

Virtualization

Virtualization

-Run many different operating systems on the same hardware

Each application instance has its operating system

-Adds overhead and complexity

-Virtualization is relatively expensive

<p>Virtualization</p><p>-Run many different operating systems on the same hardware</p><p>Each application instance has its operating system </p><p>-Adds overhead and complexity</p><p>-Virtualization is relatively expensive </p>
New cards
19

Internet of Things (IoT)

The idea is that objects are becoming connected to the Internet so they can interact with other devices, applications, or services.

Sensors

-Heating and cooling, lighting

Smart devices

-Home automation, video doorbells

Wearable technology

-Watches, health monitors

Facility automation

-Temperature, air quality, lighting

Weak defaults

-IoT manufacturers are not security professionals

New cards
20

SCADA/ICS

Supervisory Control and Data Acquisition System

-Large-scale, multi-site Industrial Control Systems (ICS)

PC manages equipment

-Power generation, refining, manufacturing equipment

-Facilities, industrial, energy, logistics

Distributed control systems

-Real-time information

-System control

Requires extensive segmentation

-No access from the outside

<p>Supervisory Control and Data Acquisition System</p><p>-Large-scale, multi-site Industrial Control Systems (ICS)</p><p>PC manages equipment</p><p>-Power generation, refining, manufacturing equipment</p><p>-Facilities, industrial, energy, logistics</p><p>Distributed control systems</p><p>-Real-time information</p><p>-System control</p><p>Requires extensive segmentation</p><p>-No access from the outside </p>
New cards
21

Industrial Control Systems (ICS)

Used to control industrial processes such as manufacturing, product handling, production, and distribution.

New cards
22

Supervisory Control and Data Acquisition (SCADA)

A network that includes software, servers, and communication channels. SCADA is responsible for acquiring real-time data from a physical system and managing the physical system or presenting the data to humans, who monitor and manage the system.

New cards
23

Real-Time Operating System (RTOS)

An operating system with a deterministic processing schedule

-No time to wait for other processes

-Industrial equipment, automobiles

-Military environments

Extremely sensitive to security issues

-Non-trivial systems

-Need to always be available

-Difficult to know what type of security is in place

New cards
24

Embedded systems

Hardware and software designed for a specific function

-Operate as part of a larger system

It is built with only this task in mind

-Can be optimized for size and/or cost

Common examples

-Traffic light controllers

-Digital watches

-Medical imaging systems

New cards
25

High availability

Redundancy does not always mean available

-May need to be powered on manually

HA (high availability)

-Always on, always available

May include different components working together

-Active/Active can provide scalability advantages

Higher availability almost always means higher costs

-There's always another contingency you could add

-Upgraded power, high-quality server components, etc.

New cards
26

Availability

System uptime

-Access data, complete transactions

-A foundation of IT security

A balancing act with security

-Available, but only to the right people

We spend a lot of time and money on availability

-Monitoring, redundant systems

An important metric

-We are often evaluated on total available time

New cards
27

Resilience

Eventually, something will happen

-Can you maintain availability

Can you recover? How quickly?

Based on many different variables

-The root cause

-Replacement hardware installation

-Software patch availability

-Redundant systems

Commonly referenced as MTTR

-Mean Time to Repair

New cards
28

Cost

How much money is required?

-Everything ultimately comes down to cost

Initial installation

-Very different across platforms

Ongoing maintenance

-Annual ongoing cost

Replacement or repair costs

-You might need more than one

Tax implications

-Operating or capital expense

New cards
29

Responsiveness

Request information

-Get a response

-How quickly did that happen?

Especially important for interactive applications

-Humans are sensitive to delays

Speed is an important metric

-All parts of the application contribute

-There is always a weakest link

New cards
30

Scalability

How quickly and easily can we increase or decrease capacity?

-This might happen many times a day

-Elasticity

There is always a resource challenge

-What is preventing scalability?

Needs to include security monitoring

-Increases and decreases as the system scales

New cards
31

Ease of deployment

An application has many moving parts

-Web server, database, caching server, firewall, etc

This might be an involved process

-Hardware resources, cloud budgets, change control

This might be very simple

-Orchestration/ automation

It is crucial to consider during the product engineering phase

-One missed detail can cause deployment issues

New cards
32

Risk transference

Many methods to minimize risk

-Transfer the risk to a third-party

Cybersecurity insurance

-Attacks and downtime can be covered

-Popular with the rise in ransomware

Recover internal losses

-Outages and business downtime

Protect against legal issues from customers

-Limit the costs associated with legal proceedings

New cards
33

Easy of recovery

Something will eventually go wrong

-Time is money

-How easily can you recover?

Malware infection

-Reload operating system from original media - 1 hour

-Reload from corporate image - 10 minutes

New cards
34

Patch availability

Software is not usually static

-Bug fixes, security updates, etc.

This is often the first task after installation

-Make sure you are running the latest version

Most companies have regular updates

-Microsoft's monthly patch schedule

Some companies rarely patch

-This might be a significant concern

New cards
35

Inability to patch

What if patching was not an option?

-This happens more often than you might think

Embedded systems

-HVAC controls

-Time clocks

Not designed for end-user updates

-This is a bit short-sighted

-Especially these days

May need additional security controls

-A firewall for your time clock

New cards
36

power

A foundational element

-This can require extensive engineering

Overall power requirements

-Data center vs. office building

Primary power

-One or more providers

Backup services

-UPS (Uninterruptible Power Supply)

-Generators

New cards
37

Compute

An application's heavy-lifting

-More than just a single CPU

The compute engine

-More options available in the cloud

It may be limited to a single processor

-Easier to develop

Use multiple CPUs across multiple clouds

-Additional complexity

-Enhanced scalability

New cards
38

Device Placement

Every network is different

-There are often similarities

Firewalls

-Separate trusted from untrusted

=Provide additional security checks

Other services may require their security technologies

-Honeypots, jump server, load balancers, sensors

New cards
39

Security zones

Zone-based security technologies

-More flexible (and secure) than IP address ranges

Each area of the network is associated with a zone

-Trusted, untrusted

-Internal, external

-Inside, Internet, Servers, Databases, Screened

This simplifies security policies

-Trusted to Untrusted

-Untrusted to Screened

-Untrusted to Trusted

<p>Zone-based security technologies</p><p>-More flexible (and secure) than IP address ranges</p><p>Each area of the network is associated with a zone</p><p>-Trusted, untrusted</p><p>-Internal, external</p><p>-Inside, Internet, Servers, Databases, Screened</p><p>This simplifies security policies</p><p>-Trusted to Untrusted</p><p>-Untrusted to Screened</p><p>-Untrusted to Trusted</p>
New cards
40

Attack surface

How many ways into your home?

-Doors, windows, basements

Everything can be a vulnerability

-Application code

-Open ports

-Authentication process

-Human error

Minimize the surface

-Audit the code

-Block ports on the firewall

-Monitor network traffic in real-time

New cards
41

Connectivity

Everything contributes to security

-Including the network connection

Secure network cabling

-Protect the physical drops

Application-level encryption

-The hard work has already been done

Network-level encryption

-IPsec tunnels, VPN connections

New cards
42

Failure Modes

We hope for 100% uptime

-This is not realistic

-Eventually, something will break

Fail-open

When a system fails, data continues to flow

Fail-closed

-When a system fails, data does not flow

New cards
43

Device connections

Active monitoring

-System is connected inline

-Data can be blocked in real-time as it passes by

-Intrusion prevention is commonly active

Passive monitoring

-A copy of the network traffic is examined using a tap or port monitor

-Data cannot be blocked in real-time

-Intrusion detection is commonly passive

New cards
44

Active monitoring

IDS/IPS sits physically inline

-All traffic passes through the IDS/IPS

Malicious traffic is immediately identified

-Dropped at the IPS

-Does not proceed through the network

Internet -> Firewall -> IPS -> Core Switch

New cards
45

Passive monitoring

Examine a copy of the traffic

-Port mirror (SPAN), network tap

No way to block (prevent) traffic

-Common with Intrusion Detection Systems

IPS -> Switch -> Server, Clients

New cards
46

Jump server

Access secure network zones

-Provides an access mechanism to a protected network

Highly-secured device

-Hardened and monitored

SSH/Tunnel/ VPN to the jump server

- RDP, SSH or jump from there

A significant security concern

-Compromise of the jump server is a significant breach

<p>Access secure network zones </p><p>-Provides an access mechanism to a protected network</p><p>Highly-secured device</p><p>-Hardened and monitored</p><p>SSH/Tunnel/ VPN to the jump server</p><p>- RDP, SSH or jump from there</p><p>A significant security concern</p><p>-Compromise of the jump server is a significant breach</p>
New cards
47

Proxies

Sits between the users and the external network

Receives the user request and sends the request on their behalf (the proxy)

Useful for caching information, access control, URL filtering, content scanning

Applications may need to know how to use the proxy (explicit)

Some proxies are invisible (transparent)

<p>Sits between the users and the external network </p><p>Receives the user request and sends the request on their behalf (the proxy)</p><p>Useful for caching information, access control, URL filtering, content scanning</p><p>Applications may need to know how to use the proxy (explicit)</p><p>Some proxies are invisible (transparent)</p>
New cards
48

Application proxies

One of the simplest "proxies" is NAT

-A network-level proxy

Most proxies in use are application proxies

-The proxy understands the way the application works

A proxy may only know one application

-HTTP

New cards
49

Forward proxy

An "internal proxy."

-Commonly used to protect and control user access to the internet

<p>An "internal proxy."</p><p>-Commonly used to protect and control user access to the internet </p>
New cards
50

Reverse proxy

Inbound traffic from the internet to your internal service

<p>Inbound traffic from the internet to your internal service</p>
New cards
51

Open proxy

A third-party, uncontrolled proxy

-Can be a significant security concern

-Often used to circumvent existing security controls

<p>A third-party, uncontrolled proxy</p><p>-Can be a significant security concern </p><p>-Often used to circumvent existing security controls</p>
New cards
52

Intrusion Prevention System (IPS)

Intrusion Prevention System

-Watch network traffic

Intrusions

-Exploits against operating systems, applications, etc.

-Buffer overflows, cross-site scripting, and other vulnerabilities

Detection vs Prevention

-Intrusion Detection System (IDS - Alarm or alert

-Prevention - Stop it before it gets into the network

New cards
53

Balancing the load

Distribute the load

-Multiple servers

-Invisible to the end-user

Large-scale implementations

-Web server farms, database farms

Fault tolerance

-Server outages have no effect

-Very fast convergence

<p>Distribute the load</p><p>-Multiple servers</p><p>-Invisible to the end-user</p><p>Large-scale implementations</p><p>-Web server farms, database farms</p><p>Fault tolerance</p><p>-Server outages have no effect</p><p>-Very fast convergence </p>
New cards
54

Active/active load balancing

Configurable load

-Manage across servers

TCP offload

-Protocol overhead

SSL offload

-Encryption/Decryption

Caching

-Fast response

Prioritization

-QoS

Content Switching

-Application-centric balancing

<p>Configurable load</p><p>-Manage across servers</p><p>TCP offload</p><p>-Protocol overhead</p><p>SSL offload</p><p>-Encryption/Decryption</p><p>Caching</p><p>-Fast response</p><p>Prioritization</p><p>-QoS</p><p>Content Switching </p><p>-Application-centric balancing</p>
New cards
55

Active/passive load balancing

Some servers are active

-Others are on standby

If an active server fails, the passive server takes it place

<p>Some servers are active</p><p>-Others are on standby</p><p>If an active server fails, the passive server takes it place</p>
New cards
56

Sensors and collectors

Aggregate information from network devices

-Built-in sensors, separate devices

-Integrated into switches, routers, servers, firewalls, etc.

Sensors

-Intrusion prevention systems, firewall logs, authentication logs, web server access logs, database transaction logs, email logs

Collectors

-Proprietary consoles (IPS, firewall), SIEM consoles, Syslog servers

-Many SIEMs include a correlation engine to compare diverse sensor data

<p>Aggregate information from network devices</p><p>-Built-in sensors, separate devices</p><p>-Integrated into switches, routers, servers, firewalls, etc.</p><p>Sensors</p><p>-Intrusion prevention systems, firewall logs, authentication logs, web server access logs, database transaction logs, email logs</p><p>Collectors</p><p>-Proprietary consoles (IPS, firewall), SIEM consoles, Syslog servers</p><p>-Many SIEMs include a correlation engine to compare diverse sensor data</p>
New cards
57

Port security

We have created many authentication methods through the years

-A network administrator has many choices

Use a username and password

-Other factors can be included

Commonly used on wireless networks

-Also works on wired networks

New cards
58

Extensible Authentication Protocol (EAP)

A framework for transporting authentication protocols that define the format of the messages.

There are many different ways to authenticate based on RFC standards

-Manufacturers can build their own EAP methods

EAP integrates with 802.1x

-Prevents access to the network until the authentication succeeds

<p>A framework for transporting authentication protocols that define the format of the messages.</p><p>There are many different ways to authenticate based on RFC standards</p><p>-Manufacturers can build their own EAP methods</p><p>EAP integrates with 802.1x</p><p>-Prevents access to the network until the authentication succeeds </p>
New cards
59

IEEE

Institute of Electrical and Electronic Engineers. International organization focusing on electrical, electronics, and information technology topics. IEEE standards are well respected and followed by vendors around the world.

New cards
60

IEEE 802.1x Authentication

IEEE 802.1x

-Port-based Network Access Control (NAC)

-You do not get access to the network until you authenticate

EAP integrates with 802.1x

-Extensible Authentication Protocol

-802.1x prevents access to the network until the authentication succeeds

Used in conjunction with an authentication database

-RADIUS, LDAP, TACAC+, KERBEROS, etc.

New cards
61

IEEE 802.1X and EAP

Supplicant - the client

Authenticator - The device that provides access

Authentication server - Validates the client's credentials

<p>Supplicant - the client</p><p>Authenticator - The device that provides access</p><p>Authentication server - Validates the client's credentials</p>
New cards
62

Web application firewall (WAF)

Not like a "normal" firewall

-Applies rules to HTTP/HTTPS conversations

Allow or deny based on expected input

-Unexpected input is a common method of exploiting an application

SQL injection

-Add your own commands to an application's SQL query

A major focus of the Payment Card Industry Data Security Standard (PCI DSS)

<p>Not like a "normal" firewall</p><p>-Applies rules to HTTP/HTTPS conversations</p><p>Allow or deny based on expected input</p><p>-Unexpected input is a common method of exploiting an application</p><p>SQL injection</p><p>-Add your own commands to an application's SQL query </p><p>A major focus of the Payment Card Industry Data Security Standard (PCI DSS)</p>
New cards
63

The universal security control

Standard issue

-Home, office, and in your operating system

Control the flow of network traffic

-Everything passes through the firewall

Corporate control of outbound and inbound data

-Sensitive materials

Control of inappropriate content

-Not safe for work, parental controls

Protection against evil

-Anti-virus, anti-malware

New cards
64

Network-based firewalls

Filter traffic by port number or application

-OSI layer 4 vs. OSI layer 7

-Traditional vs NGFW firewalls

Encrypt traffic

-VPN between sites

Most firewalls can be layer 3 devices (routers)

-Often sits on the ingress/egress of the network

-Network Address Translation (NAT) functionality

-Authenticate dynamic routing communication

<p>Filter traffic by port number or application</p><p>-OSI layer 4 vs. OSI layer 7</p><p>-Traditional vs NGFW firewalls</p><p>Encrypt traffic</p><p>-VPN between sites</p><p>Most firewalls can be layer 3 devices (routers)</p><p>-Often sits on the ingress/egress of the network</p><p>-Network Address Translation (NAT) functionality</p><p>-Authenticate dynamic routing communication</p>
New cards
65

UTM/ All-in-one security appliance

Unified Threat Management (UTM)/ Web security gateway

URL filter/ Content inspection

Malware inspection

Spam filter

CSU/DSU

Router, Switch

Firewall

IDS/IPS

Bandwidth Shaper

VPN endpoint

New cards
66

Next-generation firewall (NGFW)

The OSI Application Layer

-All data in every packet

Can be called different names

-Application layer gateway

-Stateful multilayer inspection

-Deep packet inspection

Requires some advanced decodes

-Every packet must be analyzed and categorized before a security decision is determined.

Layer 4/ layer 7

New cards
67

NGFWs

Network-based Firewalls

-Control traffic flows based on the application

-Microsoft SQL, Server, Twitter, YouTube

Intrusion Prevention Systems

-Identify the application-specific

-Apply application-specific vulnerability signatures to the traffic

Content filtering

-URL filters

-Control website traffic by category

New cards
68

Virtual Private Network (VPN)

A private data network that creates secure connections, or "tunnels," over regular Internet lines

Encrypted (private) data traversing a public network

Concentrator

-Encryption/decryption access device

-Often integrated into a firewall

Many deployment options

-Specialized cryptographic hardware

-Software-based options available

Used with client software

-Sometimes built into the OS

New cards
69

Remote Access VPN

A user-to-LAN virtual private network connection used by remote users.

New cards
70

Encrypted Tunnel

The result is placing each packet in an encrypted form within another packet before sending it to add a layer of security that protects each packet on its journey over the Internet. The outer packet protects the contents from public view and ensures that the packet moves within a virtual tunnel.

Keep data private across the public internet

-Encryption is the key

Encrypt your data

-Add new headers and trailers

Decrypt on the other side

-Original data is delivered

<p>The result is placing each packet in an encrypted form within another packet before sending it to add a layer of security that protects each packet on its journey over the Internet. The outer packet protects the contents from public view and ensures that the packet moves within a virtual tunnel.</p><p>Keep data private across the public internet</p><p>-Encryption is the key</p><p>Encrypt your data</p><p>-Add new headers and trailers </p><p>Decrypt on the other side </p><p>-Original data is delivered </p>
New cards
71

SSL/TLS VPN (Secure Socket Layer VPN)

Uses common SSL/TLS protocol (TCP/443)

-(Almost) No firewall issues

No big VPN clients

-Usually, remote access communication

Authenticate users

-No requirement for digital certificates or shared passwords (like IPSec)

It can be run from a browser or from a (usually light) VPN client

-Across many operating systems

New cards
72

SSL/TLS VPN

VPN setup through a web browser or portal that uses SSL/TLS to secure traffic. Gives users access to the target network.

On-demand access from a remote device

-Software connects to a VPN concentrator

Some software can be configured as always-on

<p>VPN setup through a web browser or portal that uses SSL/TLS to secure traffic. Gives users access to the target network.</p><p>On-demand access from a remote device</p><p>-Software connects to a VPN concentrator </p><p>Some software can be configured as always-on </p>
New cards
73

IPSec (Internet Protocol Security)

A set of open, non-proprietary standards that you can use to secure data as it travels across the network or the Internet through data authentication and encryption.

New cards
74

Site-to-site IPsec VPN

Always-on

Firewalls often act as VPN concentrators

-Probably already have firewalls in place

<p>Always-on</p><p>Firewalls often act as VPN concentrators</p><p>-Probably already have firewalls in place</p>
New cards
75

SD-WAN - software-defined wide area network

Software Defined Networking in a Wide Area Network

- A WAN built for the cloud

The data center used to be in one place

-The cloud has changed everything

Cloud-based applications communicate directly to the cloud

-No need to hop through a central point

<p>Software Defined Networking in a Wide Area Network</p><p>- A WAN built for the cloud</p><p>The data center used to be in one place</p><p>-The cloud has changed everything</p><p>Cloud-based applications communicate directly to the cloud</p><p>-No need to hop through a central point </p>
New cards
76

Selection of effective controls

Many different security options

-Selecting the right choice can be challenging

VPN

-SSL/TLS VPN for user access

-IPsec tunnels for site-to-site access

SD-WAN

-Manage the network connectivity to the cloud

-Does not adequately address security concerns

SASE

-A complete network and security solution

-Requires planning implementation

New cards
77

Secure Access Service Edge (SASE)

Update secure access for cloud services

-Securely connect from different locations

A "next generation" VPN

Security technologies are in the cloud

-Located close to existing cloud services

SASE clients on all devices

-Streamlined and automatic

<p>Update secure access for cloud services</p><p>-Securely connect from different locations</p><p>A "next generation" VPN</p><p>Security technologies are in the cloud</p><p>-Located close to existing cloud services </p><p>SASE clients on all devices</p><p>-Streamlined and automatic </p>
New cards
78

Data types

Regulated

Trade Secret

Intellectual property

Legal information

Financial information

Human and non human readable

New cards
79

Regulated

Managed by a third-party

Government laws and statutes

New cards
80

Trade secret

An organization's secret formulas

Often unique to an organization

New cards
81

Intellectual property

It may be publicly visible

Copyright and trademark restrictions

New cards
82

Legal information

Court records and documents, judge and attorney information, etc.

PII and other sensitive details

Usually stored in many different systems

New cards
83

Financial information

Internal company financial details

Customer financials

Payment records

Credit card data, bank records, etc.

New cards
84

Human-readable

Humans can understand the data

Very clear and obvious

New cards
85

Non-human readable

Not easily understood by humans

Encoded data

Barcodes

Images

New cards
86

Hybrid formats

CSV, HXM, JSON, etc.

New cards
87

Classifying sensitive data

Not all data has the same level of categorization

-License tag numbers vs. health records

Different levels require different security and handling

-Additional permissions

-A different process to view

-Restricted network access

New cards
88

Data Classifications

Proprietary

-Data that is the property of an organization

-May also include trade secrets

-Often data unique to an organization

PII - Personally Identifiable Information

-Data that can be used to identify an individual

-Name, date of birth, mother's maiden name, biometric information

PHI- Protected health information

-Health information associated with an individual

-Health status, health care records, payments for health care, and much more.

Types

Sensitive

Confidential

Public

Restricted

Private

Critical

New cards
89

Sensitive data

Intellectual property, PII, PHI

New cards
90

Confidential Data

Very sensitive, must be approved to view

New cards
91

Public/ Unclassified

No restrictions on viewing the data

New cards
92

Private/Classified/Restricted Data

Restricted access, may require an NDA

New cards
93

Critical Data

Data should always be available

New cards
94

States of Data

Data at rest

Data in transit

Data in Use

New cards
95

Data at Rest

The data is on a storage device

-Hard drive, SSD, flash drive, etc.

Encrypt the data

-Whole disk encryption

-Database encryption

-File or folder-level encryption

Apply for permissions

-Access control lists

-Only authorized users can access the data

New cards
96

Data in transit

Data transmitted over the network

-Also called data-in-motion

Not much protection as it travels

-Many different switches, routers, devices

Network-based protection

-Firewall, IPS

Provide transport encryption

-TLS (Transport Layer Security)

IPsec(Internet Protocol Security)

New cards
97

Data in use

Data is actively processed in memory

-System RAM, CPU registers and cache

The data is almost always decrypted

-Otherwise, you could not do anything with it

The attackers can pick the decrypted information out of RAM

-A very attractive option

New cards
98

Data sovereignty

Data Sovereignty

-Data that resides in a country is subject to the laws of that country

-Legal monitoring, court orders, etc.

Laws may prohibit where data is stored

-GDPR (General Data Protection Regulation)

-Data collected on EU citizens must be stored in the EU

-A complex mesh of technology and legalities

Where is your data stored

-Your compliance laws may prohibit moving data out of the country

New cards
99

Geolocation

Location details

-Tracks within a localized area

There are many ways to determine a location

-802.11, mobile providers, GPS

Can be used to manage data access

-Prevent access from other countries

Limit administrative tasks unless a secure area is used

-Permit enhanced access when inside the building

New cards
100

Geographic restrictions

Network location

-Identify based on IP subnet

-Can be difficult with mobile devices

Geolocation - Determine a user's location

-GPS - mobile devices, very accurate

-802.11 wireless, less accurate

-IP address, not very accurate

Geofencing

-Automatically allow of restricting access when the user is in a particular location

-Do not allow this app to run unless you are near the office

New cards

Explore top notes

note Note
studied byStudied by 1 person
86 days ago
5.0(1)
note Note
studied byStudied by 14 people
761 days ago
5.0(2)
note Note
studied byStudied by 66 people
511 days ago
5.0(1)
note Note
studied byStudied by 14 people
953 days ago
5.0(1)
note Note
studied byStudied by 5 people
926 days ago
4.0(1)
note Note
studied byStudied by 10 people
895 days ago
5.0(1)
note Note
studied byStudied by 11 people
972 days ago
4.5(2)
note Note
studied byStudied by 5237 people
150 days ago
4.4(9)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 7 people
662 days ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 73 people
748 days ago
5.0(5)
flashcards Flashcard (43)
studied byStudied by 3 people
635 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 8 people
789 days ago
5.0(1)
flashcards Flashcard (170)
studied byStudied by 7 people
121 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 41 people
97 days ago
5.0(1)
flashcards Flashcard (1000)
studied byStudied by 29 people
852 days ago
4.0(1)
flashcards Flashcard (53)
studied byStudied by 3742 people
709 days ago
4.2(54)
robot