Security Architecture (Chapter 3) Flashcards

(44 cards)

1
Q

Network Segmentation

A

Is splitting a network into separate segments to create a “security zone”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trunk link

A

Are links between switches that allows VLANs to extend over multiple switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical segmentation of a network

A

Air-gap
- Is the process of segmenting a portion of a network so that it has no connection to the network.
- most secure
- vulnerability: Removable media, Environmental control compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VLAN Segmentation

A

Is segmenting a network over switches by dividing the ports up into VLANs
- Can be extended over multiple switches via trunk links
- Vulnerability: VLAN hopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

High Availability

A

Refers to a system that continuously operates, with no downtime.
- accomplished by having multiple redundancy features, to allow for components failure and repairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clustering

A

Having 2 or more hosts that act as a single unified system, that s
Share data and run the same service
- hosts needs to have a link between eachother for ‘heartbeat’ communication
- each host has it’s own IP address and MAC address
- the cluster itself has a separate IP address and MAC address, which the DNS uses
- active/standby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Load balancing

A

Multiple hosts that act as a single system, that runs the same service but doe not share data
- clients connect to a load balancing application that forwards request to the service hosts
- hosts have separate IP and MAC address
- load balancer has itself a IP and MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Replication

A

Similar to load balancing but does not share a common name, IP address or MAC address and are often on separate networks, each server runs a copy of the service and data are replicated across the servers.
- eg Directory Domain Controllers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtualization

A

Is creating multiple systems (Virtual Machines) that runs on a singular machines that can utilize all of th machines resources making it more efficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virtual Desktop Infrastructure (VDI)

A

Aka thin client
Is a virtualization infrastructure that creates multiple virtual desktop for each users that is run off of a server.
The user connects to the server via a VPN link and all applications and data are stored in the VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Software Defined Networking (SDN)

A

A virtual network, that uses software based controllers that communicates with underlying hardware infrastructure, direct traffic on a network.
Allows for VMs to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Containerization

A

Is a lightweight Virtual Machine that has everything it needs to run a specific apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Infrastructure as Code (IaC)

A

The managing and provisioning of infrastructure (servers) through code instead of manual processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Serverless Architecture

A

A way of building and running applications and services without having to manage the infrastructure (servers, VLAN, ect)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Microservices

A

An organisational approach to software development that is composed of small independent services that communicate over well defined APIs. Having independent services allows each service to be independently updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IoT Architecture

A

End devices
- devices with sensors that gather telemetry data
IoT Gateway
- gateway to connect IoT to other devices on a network
Data System
-Allows the IoT devices to connect, store and process telemetry data
Remote Control
- apps can be used to access IoT devices remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RTOS System

A

Real-time Operating System are systems that accepts and performs process within a short amount of time (1/10 of a second).
-Used in mission critical applications that overrides other processes including security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Embedded systems

A

A system in which avcomputer is included as an integral part of an overall system

19
Q

Reducing Attack Surface

A
  • Maintain consistent policies
  • defense-in-depth
  • zero Trust
  • endpoint protection protects the network from the devices
20
Q

Failure Modes

A

Fail Closed
- mode that if a system detects a failure the system will shut down and stop functioning.
- used to secure the device
Failed Open
- a mode that if a system detect a failure the system will continue to work as intended
- used when access is more important than security

21
Q

Web application Firewall (WAF)

A

Used to inspect web traffic and blocks malicious traffic
- needs decryption certificate so it can inspect HTTPS

22
Q

Unified Threat Management (UTM)

A

A multi-purpose appliance that contains a firewall, VPN server, Antivirus and other security features

23
Q

Next-generation Firewall (NGFW)

A

A firewall that performs deep packet inspection (can look into the payload of traffic)

24
Q

Layer 4 firewall

A

A firewall that doesn’t inspects application-layer payloads but looks at the encapsulation headers

25
Layer 7 firewall
A firewall that looks at all layers of TCP/IP
26
Stateless Firewall
A firewall that is set up to inspect every packet and is compared to a list of rules - has no memory of previous packets - best used for when high performance is critical
27
Stateful Firewall
A firewall the inspects packets and compares them with a list of rules. - it maintains a state table for every connection which is used to verify that connection is legit - filters packet at the network and transport layer
28
Circuit-level Gateway
Works at session Layer (layer 5) - allows/disallows entire connections as opposed to individual packets
29
Application level Gateway
Filters packets at the application Layer (layer 7), and examines the payload
30
31
Types of Intrusion Detection Systems
**Network based** - NIDS (network intrusion detection system) - NIPS (Network intrusion prevention system) - a separate system on the network that monitors the traffic on the network for any malicious activities **Host Based** -HIDS (Host-based Intrusion Detection Systems) - HIPS (host-based prevention system) - application on a host system that audits events and monitors of malicious activity on the host
32
Network Intrusion Detection
**Signature Based** - uses a list 'signatures' of a previously used attacks to detect an attack - is only protected against known attacks and not 0-Days **Anomaly-Based** - Uses a previously created baseline of the network activity to detects any anomalies that could be malicious - Prone to false positives
33
NIDS
Network Intrusion Detection Systems - a passive monitoring system that monitors traffic when it passes a IDS sensors which is then compared to a rule set - if traffic matches a rule then it's logged and an alert can be triggered
34
NIPS
Network Intrusion Prevention System - an active monitoring and control system that compares traffic to 'signatures' - if a signature is matched packet is dropped
35
Host-based HIDs/HIPs
Software based Intrusion systems are installed on a host system and only monitors the activity of that host. HIDs - logs suspicious activity HIPs - prevent suspicious activity
36
WiFi IPs
Wireless intrusions prevention system - monitors the radio spectrum for the presence of unauthorized access points and automatically implements countermeasures is detected
37
Proxy
A server that fetches data on behalf of a client, thus hiding the clients information. Forward Proxy - fetches data from the internet Reverse Proxy - fetched data from a private network
38
Jump server
A secure system that spans two or more networks allowing a connected client to 'jump' onto another network
39
VPN
Virtual Private Network - a mechanism that creates a secure connection over an unsecured network - traffic is encrypted before transmission
40
TLS
Transport Layer Security A secure means of transmitting traffic on a network by encrypting the Payload for an HTTPs connection (port 443)
41
IP Security
Most common type of VPN thatbises Internet Key Exchange to negotiate a session. consists of 2 protocols - Authentication Header - Encapsulating Security Payload As well as it's ability for Tunneling and Transport (Encryption)
42
IPSEC Transport mode
Host-to-Host VPN
43
IPSEC Tunnel Mode
Router-to-Router VPN used for site to site connection
44