Chapter 12 Flashcards
Network Security (34 cards)
Selection of effective controls
A key component in securing networks and requires both an understanding of threats and the controls that can address them.
Open Systems Interconnection (OSI)
Used to describe how devices and software operate together through networks. There are 7 Layers:
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Security Zone
Network segments, physical or virtual network segments, or other components of an infrastructure that are able to be separate from less secure zones through logical or physical means.
Connectivity Considerations
Include how the organization connects to the internet, whether it has redundant connections, how fast the connections are, what security controls the upstream connectivity provider can make available, and what type of connectivity is in use.
Failed-Closed
Failure Mode States
A device/system that shuts down or restricts access when a failure occurs, prioritizing security over availability. This approach ensures that if a security mechanism fails—such as a firewall or authentication system—it blocks all access rather than allowing unauthorized entry.
Failed-Open
Failure Mode States
A device/system that allows access when a failure occurs, prioritizing availability over security. If a security mechanism—like a firewall or authentication system—fails, it remains open, allowing traffic or users to continue operating without restriction.
Network Taps
Devices used to monitor or access traffic.
Active or Passive
The device/system is either powerdor not powered. A passive device can’t lose power.
Physcial Isolation
Also known as air-gapped, the idea of separating devices so that there is no connection between them.
Logical Segmentation
Done using software or settings rather than a physical separation.
What are examples of secure protocols?
Implementation of secure protocols
The use of HTTPS (TLS) instead of unecrypted HTTP, using SSH instead of Telnet, and wrapping other services using TLS.
Protocol Selection
Implementation of secure protocols
Defaults to using the secure protocol if it exists and is supported.
Reputation
Describes services and data feeds that track IP addresses, domains, and hosts that engage in malicious activity.
Software-Defined Networking
A network that is controlled and configured using code
and software.
Software-Defined Wide Area Networking (SD-WAN)
A virtual wide area network design that can combine multiple connectivity services for organizations. Commonly used with Multiprotocol Label Switching (MPLS), 4G and 5G, and broadband route traffic based on application requirements while controlling costs by using less expensive connection methods.
Multiprotocol Label Switching (MPLS)
A networking technique that speeds up data transmission by using labels instead of traditional IP routing. Instead of routers making independent forwarding decisions, MPLS establishes predefined paths for packets, improving efficiency and reducing latency.
Secure Access Service Edge (SASE)
Combines virtual private networks, SD-WAN, and cloud-based security tools like firewalls, cloud access security brokers (CASBs) and zero-trust networks to provide secure access for devices regardless of their location.
Network Segmentation
Divides a network into logical or physical groupings that are frequently based on trust boundaries, functional requirements, or other reasons that help an organzation apply controls or assist with functionality.
Broadcast Domain
A segment of a network in which all devices or systems can reach one antoher via packets sent as a broadcast at the Data Link Layer.
Screened Subnets
Implementations of Network Segmentation
Often called Demilitarized Zones (DMZ), are networks zones that contain systems that are exposed to less trusted areas.
Intranets
Implementations of Network Segmentation
Internal networks set up to provide information to employees or other members of an organization, and they are typically protected from external access.
Extranets
Implementations of Network Segmentation
Networks that are set up for external access, typically by partners or customers rather than the public at large.
Zero Trust Architecture (ZTA)
Zero Trust Architecture (ZTA) is a cybersecurity framework that eliminates implicit trust and continuously verifies users, devices, and network activity before granting access. Unlike traditional security models that assume everything inside a network is safe, ZTA operates under the principle of “never trust, always verify.”
Subjects
Zero Trust Architecture (ZTA)
The users, services, or systems that request access or attempt to use rights.