Security Architecture 3.2 Flashcards

1
Q

Device Placement

A

Firewalls - Separate the network. Trusted from untrusted.
Honeypots, jump server, load balancers, sensors - help to contribute to a more secure computing environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Zones.

A

Zone-based security technology.
Separate each area of the network such as an internal, external zone or Trusted or untrusted zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack Surface

A

What parts of the network are vulnerable?
- Application code
-Open ports
-Authentication Process
-Human error

Goal is to Minimise the attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Connectivity

A

Everything contributes to security.
Secure Network cabling, Application-level encryption.
Network-Level Encryption. (VPNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPS Intrusion Prevention System

A

Designed to watch traffic traversing the network. The IPS blocks anything it determines as an intrusion from gaining access into the network.

IDS intrusion detection system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Failure mode:

A

Fail open - When the system fails data will continue to flow without security.
Fail close - When the system fails data does not flow. Very secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Active monitoring vs Passive monitoring.

A

Active monitoring is inline with the traffic and can prevent traffic it seems to be malicious before it reaches the switch.
Passive monitoring examines a copy of the traffic and sends it to the IPS. (SPAN, Network tap). Not inline so cannot prevent the malicious traffic from reaching the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Jump Server

A

A device on the inside of the network which is accessible from the outside. Usually hardened with security.

A jump server can be a significant security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proxy Server

A

Internal devices communicate to a proxy server and the proxy server then communicates to the internet. Receives the user requests on their behalf.

Proxies - URL filtering.
Some proxies are invisible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application Proxies

A

Understands the protocols used for a specific application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Forward Proxy

A

A user sends a request to the proxy and the proxy sends the request to the internet. If everything looks okay once the internet sends the response back to the proxy it will forward on the results to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reverse Proxy

A

Users on the internet want to communicate with a webserver on an internal network. Any malicious traffic can be dropped at the proxy instead of being sent over to the web server.

Proxy can also provide a caching function where previous results are saved in the cache. Identical user requests made by the proxy will not be sent to the webserver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open Proxy

A

A third-party, uncontrolled proxy. The third party could add malicious code or adverts to messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Load Balancing

A

Distributes the load between multiple servers.
Increases fault tolerance - if a server connected to a load balancer was to fail. The load balancer would distribute the load between the remaining servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Features of a Active/ Active load balancer.

A

Configurable load - can manage the load across multiple servers
TCP offload - lowers the protocol overhead
SSL - encryption done within the load balancer so each server does not need to end encrypted files.
Caching - saves previous entries and responses for faster replies
Prioritisation - Certain applications have higher prioritisation.
Content switching - recognise the type of request being made and can make certain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Features of a Active/Passive load balances

A

There are passive web servers which are not in use and if there is a failure in one of the active web servers, the load balancer would recognise the failure and use one of the passive devices.

17
Q

Sensors and collectors.

A

Aggregate information from network devices are collected and sent to the collectors sich as a SIEM.

SIEM will contain a correlation enginge to compare diverse sensor data.

18
Q

Sensor examples

A

Firewall logs, Authentication logs, web server, access logs, database transaction logs, email logs.

19
Q

Port Security

A

The security on the individual interfaces that are on a switch or connections on a wireless access point.

20
Q

IEEE 802.1X

A

Port based network access control. To gain access to a network you would first need to authenticate using 802.1x

20
Q

EAP

A

Extensible Authentication protocol.

21
Q

Firewalls - Web application firewall

A

Analyse input into web based applications. Allow or deny based on expected input.

22
Q

Firewall. United threat management

A

Older devices, All in one security device.
Features:
URL Filter
Malware inspection
Spam Filter
CSU/DSU
Router, Switch
Firewall.
IDS, IPS
Bandwidth Shaper,
VPN endpoint.

23
Q

Firewall - Next Generation firewall

A

Is able to examine all traffic traversing the networking. What is contained on the application layer of and make forwarding decisions.

24
Q

OSI Layer 4 vs OSI layer 7

A

Layer 4 firewalls monitor traffic using a TCP or UTP port number.

OSI layer 7 allow or disallow traffic based on what application is being used over the network.

25
Q

VPN - Secure

A

Encrypts data traversing a public network. Managed using a concentrator to provide a VPN endpoint capability and decryption.

26
Q

Encrypted Tunnel

A

Original data is wrapped with IPsec Header and IPsec trailer.

With a new IP header which provides the information to the routers along the way to point this information to the correct IPSEC concentrator.

27
Q

TLS

A

Transport layer security
?

28
Q

SD WAN

A

?

29
Q

SASE

A

?