Supporting Network Security Design Flashcards
(15 cards)
Network Segmentation
It means dividing networks into zones which have defined trust levels. Segmentation can be achieved through VLANs and subnets.
Intrusion Detection System Detection types:
- Signature-based: matches traffic pattern
- Anomaly based: detects abnormal behavior
IDS is installed behind firewall, requires sniffer like mirroring and it is not detectable by attackers because it does not have IP address.
Intrusion Prevention System (IPS)
Preventive measures: ends the malicious session, temporarily blocks attacker’s IP, Throttle bandwidth, apply complex rules, modify packets, and runs custom scripts.
It’s built into modern firewalls and proxies and all traffic flows through the IPS.
Internet of Things (IoT)
Embedded devices with networking, and software that can communicate with each other and other systems.
What are examples of Physical Access Controls Systems (PACs)
Smart locks, alarms, surveillance
What are examples of Building Automation Systems (BAS)
Controls HVAC, power, lighting, etc.
Industrial Internet of Things (IIoT)
Embedded devices and IoT devices used in industrial sectors like energy, mining, etc.
AIC Triad
IIoT focuses on safety, availability and integrity.
Availability > Integrity > Confidentiality
Industrial Control Systems (ICS)
Controls machinery and automates processes in critical infrastructure.
Distributed Control System (DCS)
A type of ICS managing automation within a single site.
Core components of ICS
- Programmable Logic Controllers: Embedded controllers that manage sensors and actuators (motors, valves, etc.)
- Human-machine Interfaces (HMI): Local panels or software used by operators to control or configure PLCs.
- Control Server: Governs the entire process automation system.
- Data Historian: Centralized database storing all historical data from the control loop (for analysis and auditing)
Supervisory Control and Data Aquisition (SCADA)
Coordinates control of multiple remote sites or large-scale industrial systems. Runs as software on ordinary computers to monitor, collect data, and control operations remotely.
Operational Technology Network (OT)
Communications network designed to implement an industrial control system rather than data networking.
Pan-tilt-zoom camera
Cameras that can zoom and rotate to track target
Geofencing
Creating a virtual boundary around a real-world location. Location services can detect if a device enters or exits the boundary.