3.0 - Architecture and Design Flashcards
What purpose do Industry-standard frameworks
and reference architectures serve?
They provide a roadmap for aligning IT with the organization’s business strategy.
What is the difference between Industry-standard frameworks and reference architectures?
Industry-standard frameworks is more general than the eference architectures.
This non-regulatory publication is a common framework for IT Security.
The NIST Framework for Improving Infrastructure Cybersecurity (or Cybersecurity Framework, or CSF)
This organization is a good source of benchmarking guides.
CIS (Center for Internet Security)
The Department of Defense provides implementation guides through this agency.
DISA STIGs (Defense Information Security Agency Security Technical Implementation Guides)
What is the greatest risk in configuring network infractructure devices.
Incorrect configuration of rulesets.
This security principle advocates multiple layers and overlapping controls.
Defense-in-Depth
Why is it important to have both security policy and technical controls.
Policies are important to provide a guideline for new systems.
Administrative Controls are…
… policies, regulations and laws.
Technical Controls are…
Passwords, logical access controls, ACLs, antimalware, firewalls, etc.
Most significant attacks include this component.
Most significant attacks include a user component. User training is vital.
This structure allows your important data servers to remain safe, while putting web and web application servers in a semi-trusted zone.
DMZ
How does a DMZ keep external users away from sensitive data?
Users interact with a server in the DMZ, which in-turn requests the data from a server inside the organizations trusted network.
You want to share some company data with selected business partners. What is a good solution?
An Extranet would provide secure, private access to company data.
What are two methods to provide your Intranet data to users outside the network?
The Intranet content could be duplicated in the DMZ, or it could be provided via an Extranet.
What are the types of NAT?
Types of NAT:
- Static - for web servers so that external users can initiate the connection
- Dynamic - uses a pool of public IPs
- Port Address Translation (PAT) - many internal users can share one public IP
Ad Hoc networks are difficult to manage. Why?
There is not central entry and exit point, so monitoring communcation is difficult.
What are the advantages and disadvantages of a flat network.
A flat network runs faster and avoids some latency issues associates with Spanning Tree Protocols. But letter every device see every other device creates security issues.
What is a network Enclave?
An enclave is a portion of an otherwise flat network that is partitioned off, by subnet, VLAN, proxy, firewalls, or routers.
This the most secure and most expensive method to segregate portions of the network.
Physical segregation - separate physical equipment to handle different classes of traffice.
Why are air gaps a poor security choice?
Air gaps are difficult to implement and must be strictly enforced. Failures can be significant.
This system is at the heart of a signature-based antivirus or IDS.
Correlation Engine
Where should a DDoS Mitigator be located?
A DDoS Mitigator needs to be at the edge of the network, in the network path of the systems it is protecting.
What does an Aggregation Switch do?
An Aggregation Switch connects many edge switches back to the core router, so that fewer ports are used on the router.