Chapter 12 Flashcards

Network Security (34 cards)

1
Q

Selection of effective controls

A

A key component in securing networks and requires both an understanding of threats and the controls that can address them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Open Systems Interconnection (OSI)

A

Used to describe how devices and software operate together through networks. There are 7 Layers:
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Zone

A

Network segments, physical or virtual network segments, or other components of an infrastructure that are able to be separate from less secure zones through logical or physical means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Connectivity Considerations

A

Include how the organization connects to the internet, whether it has redundant connections, how fast the connections are, what security controls the upstream connectivity provider can make available, and what type of connectivity is in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Failed-Closed

Failure Mode States

A

A device/system that shuts down or restricts access when a failure occurs, prioritizing security over availability. This approach ensures that if a security mechanism fails—such as a firewall or authentication system—it blocks all access rather than allowing unauthorized entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Failed-Open

Failure Mode States

A

A device/system that allows access when a failure occurs, prioritizing availability over security. If a security mechanism—like a firewall or authentication system—fails, it remains open, allowing traffic or users to continue operating without restriction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Taps

A

Devices used to monitor or access traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Active or Passive

A

The device/system is either powerdor not powered. A passive device can’t lose power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physcial Isolation

A

Also known as air-gapped, the idea of separating devices so that there is no connection between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logical Segmentation

A

Done using software or settings rather than a physical separation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are examples of secure protocols?

Implementation of secure protocols

A

The use of HTTPS (TLS) instead of unecrypted HTTP, using SSH instead of Telnet, and wrapping other services using TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Protocol Selection

Implementation of secure protocols

A

Defaults to using the secure protocol if it exists and is supported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Reputation

A

Describes services and data feeds that track IP addresses, domains, and hosts that engage in malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software-Defined Networking

A

A network that is controlled and configured using code
and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software-Defined Wide Area Networking (SD-WAN)

A

A virtual wide area network design that can combine multiple connectivity services for organizations. Commonly used with Multiprotocol Label Switching (MPLS), 4G and 5G, and broadband route traffic based on application requirements while controlling costs by using less expensive connection methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Multiprotocol Label Switching (MPLS)

A

A networking technique that speeds up data transmission by using labels instead of traditional IP routing. Instead of routers making independent forwarding decisions, MPLS establishes predefined paths for packets, improving efficiency and reducing latency.

17
Q

Secure Access Service Edge (SASE)

A

Combines virtual private networks, SD-WAN, and cloud-based security tools like firewalls, cloud access security brokers (CASBs) and zero-trust networks to provide secure access for devices regardless of their location.

18
Q

Network Segmentation

A

Divides a network into logical or physical groupings that are frequently based on trust boundaries, functional requirements, or other reasons that help an organzation apply controls or assist with functionality.

19
Q

Broadcast Domain

A

A segment of a network in which all devices or systems can reach one antoher via packets sent as a broadcast at the Data Link Layer.

20
Q

Screened Subnets

Implementations of Network Segmentation

A

Often called Demilitarized Zones (DMZ), are networks zones that contain systems that are exposed to less trusted areas.

21
Q

Intranets

Implementations of Network Segmentation

A

Internal networks set up to provide information to employees or other members of an organization, and they are typically protected from external access.

22
Q

Extranets

Implementations of Network Segmentation

A

Networks that are set up for external access, typically by partners or customers rather than the public at large.

23
Q

Zero Trust Architecture (ZTA)

A

Zero Trust Architecture (ZTA) is a cybersecurity framework that eliminates implicit trust and continuously verifies users, devices, and network activity before granting access. Unlike traditional security models that assume everything inside a network is safe, ZTA operates under the principle of “never trust, always verify.”

24
Q

Subjects

Zero Trust Architecture (ZTA)

A

The users, services, or systems that request access or attempt to use rights.

25
Policy Engines ## Footnote Zero Trust Architecture (ZTA)
Make policy decisions based on both rules and external systems.
26
Policy Administrators ## Footnote Zero Trust Architecture (ZTA)
Not actual people. They are components that establish or remove the communication path between subjects and resources, including creating session-specific authentication tokens or credentials as needed.
27
Policy Enforcement Points ## Footnote Zero Trust Architecture (ZTA)
They communicate with Policy Administrators to forward requests from subjects and to receive instruction from the policy adminstrators about connections to allow or end.
28
Control Plane ## Footnote Zero Trust Planes
The control plane is compose of four components: 1. Adaptive Identity 2. Threat scope reduction 3. Policy drivien access control 4. Policy administrator
29
Adaptive Identity ## Footnote Control Plane
Often called adaptive authentication, it leverages context- based authentication that considers data points like where the user is logging in from, what device they are logging in from, and whether the device meets security and configuration requirements.
30
Threat Scope Reduction ## Footnote Control Plane
A key component in Zero Trust design. Limiting the scope of what a subject can do or what access to a resource allows limits what can go wrong if an issue does occur.
31
Policy-Driven Access Control ## Footnote Control Plane
A core concept for Zero Trust policy engines that relies on policies as they make decisions that are then enforced by the security administrator and policy enforcement points.
32
Data Plane ## Footnote Zero Trust Planes
Composed of three components: 1. Implicit Trust Zones 2. Subjects and systems 3. Policy Enforce Point
33
Implicit Trust Zones ## Footnote Data Plane
Allow use and movement once a subject is authenticated by Zero Trust Policy Engine.
34
Subjects and Systems ## Footnote Data Plane
(Subject/System) The devices and users that are seeking access.