1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Attack surface
consists of the points at which an unauthorized user could gain access
Security zones
are network segments, physical or virtual network segments, or other components of an infrastructure that are able to be separate from less secure zones through logical or physical means
Another consideration are failure modes
and how the organization wants to address them. When a security device fails, should it fail so that no traffic passes it or should it fail so that all traffic passes it? These two states are known as fail-closed and fail-open
Network taps
which are devices used to monitor or access traffic, may be active or passive. That means they’re either powered or not powered