Security Architecture (Chapter 3) Flashcards
(44 cards)
Network Segmentation
Is splitting a network into separate segments to create a “security zone”
Trunk link
Are links between switches that allows VLANs to extend over multiple switches.
Physical segmentation of a network
Air-gap
- Is the process of segmenting a portion of a network so that it has no connection to the network.
- most secure
- vulnerability: Removable media, Environmental control compromise
VLAN Segmentation
Is segmenting a network over switches by dividing the ports up into VLANs
- Can be extended over multiple switches via trunk links
- Vulnerability: VLAN hopping
High Availability
Refers to a system that continuously operates, with no downtime.
- accomplished by having multiple redundancy features, to allow for components failure and repairs
Clustering
Having 2 or more hosts that act as a single unified system, that s
Share data and run the same service
- hosts needs to have a link between eachother for ‘heartbeat’ communication
- each host has it’s own IP address and MAC address
- the cluster itself has a separate IP address and MAC address, which the DNS uses
- active/standby
Load balancing
Multiple hosts that act as a single system, that runs the same service but doe not share data
- clients connect to a load balancing application that forwards request to the service hosts
- hosts have separate IP and MAC address
- load balancer has itself a IP and MAC address
Replication
Similar to load balancing but does not share a common name, IP address or MAC address and are often on separate networks, each server runs a copy of the service and data are replicated across the servers.
- eg Directory Domain Controllers
Virtualization
Is creating multiple systems (Virtual Machines) that runs on a singular machines that can utilize all of th machines resources making it more efficient.
Virtual Desktop Infrastructure (VDI)
Aka thin client
Is a virtualization infrastructure that creates multiple virtual desktop for each users that is run off of a server.
The user connects to the server via a VPN link and all applications and data are stored in the VM.
Software Defined Networking (SDN)
A virtual network, that uses software based controllers that communicates with underlying hardware infrastructure, direct traffic on a network.
Allows for VMs to communicate
Containerization
Is a lightweight Virtual Machine that has everything it needs to run a specific apps.
Infrastructure as Code (IaC)
The managing and provisioning of infrastructure (servers) through code instead of manual processes
Serverless Architecture
A way of building and running applications and services without having to manage the infrastructure (servers, VLAN, ect)
Microservices
An organisational approach to software development that is composed of small independent services that communicate over well defined APIs. Having independent services allows each service to be independently updated
IoT Architecture
End devices
- devices with sensors that gather telemetry data
IoT Gateway
- gateway to connect IoT to other devices on a network
Data System
-Allows the IoT devices to connect, store and process telemetry data
Remote Control
- apps can be used to access IoT devices remotely
RTOS System
Real-time Operating System are systems that accepts and performs process within a short amount of time (1/10 of a second).
-Used in mission critical applications that overrides other processes including security
Embedded systems
A system in which avcomputer is included as an integral part of an overall system
Reducing Attack Surface
- Maintain consistent policies
- defense-in-depth
- zero Trust
- endpoint protection protects the network from the devices
Failure Modes
Fail Closed
- mode that if a system detects a failure the system will shut down and stop functioning.
- used to secure the device
Failed Open
- a mode that if a system detect a failure the system will continue to work as intended
- used when access is more important than security
Web application Firewall (WAF)
Used to inspect web traffic and blocks malicious traffic
- needs decryption certificate so it can inspect HTTPS
Unified Threat Management (UTM)
A multi-purpose appliance that contains a firewall, VPN server, Antivirus and other security features
Next-generation Firewall (NGFW)
A firewall that performs deep packet inspection (can look into the payload of traffic)
Layer 4 firewall
A firewall that doesn’t inspects application-layer payloads but looks at the encapsulation headers