Infrastructure considerations: Key network design factors
Device placement: Where devices are located
Security zones: Network segments with distinct security policies
Attack surface: Vulnerable points exposed to threats
Connectivity: Network connections between devices
Failure modes: How devices respond to failures
Device attribute: Device characteristics
Network appliances: Devices with specific functions
Jump server: Secure access intermediary
Proxy server: Intermediary for client-server requests
IPS/IDS: Intrusion prevention and detection
Load balancer: Distributes network traffic evenly
Sensors: Monitor network traffic for anomalies
Port security: Protects physical network ports
Firewall types: Various firewall categories
Web application firewall (WAF): Protects web apps
Unified threat management (UTM): Comprehensive security
Next-generation firewall (NGFW): Advanced firewall features
Layer 4/Layer 7: OSI model-based filtering
Secure communication/access: Protects data and access
Virtual private network (VPN): Secure remote access
Remote access: Connecting to a network remotely
Tunneling: Secure data transmission method
Transport Layer Security (TLS): Data encryption protocol
Internet protocol security (IPSec): Secure network protocol
Software-defined wide area network (SD-WAN): Dynamic network management
Secure access service edge (SASE): Cloud-based network security
Selection of effective controls: Choosing security measures