1.2 Defensible Network Architecture Flashcards
Book 1.2
What ethernet uses to:
- listen before transmitting, ensuring only one station transmits at a time
- monitor transmissions to detect collisions
CSMA/CD - carrier sense with multiple access and collision detection
Principle that states that access and software should only be what’s necessary to perform a job and nothing more.
Principle of least privilege
method enforcing the idea that devices should not be allowed to communicate with one another simply by the nature of being connected.
Network segmentation
networking concept that can observe the entirety of an environment and maintain segmentation in the face of a dynamically changing network, and it’s not hardware dependant.
SDN - software defined networking
The idea that no single failure of any single part of the environment will result in a total catastrophic failure of the entirety of the environment. Provided through a tiered architecture.
Defense in depth
A tier of the network (network section) used for organizational systems that intend to be public facing such as web servers, email servers and domain name service.
DMZ / semi public
Network section that separates DMZ from the private internal Network.
Middleware or proxy
Network design that is a high level design overview. Represents internal and external systems, data flow, and overall system behavior.
Conceptual Network design
Network design that maps the components of the conceptual design via the use of a network diagram. Includes all identified devices that connect to the network.
Logical network design.
Network design that includes detailed aspects of the network components. Including OS versions, patch levels, hardening configurations, risk categorization, etc. Also includes physical risks such as network cable locations, etc
Physical Network design
A security control that can attempt to discover sensitive data on our Network systems, monitor for the misuse of that data, and potentially prevent exfiltration.
DLP - data loss prevention
Basic devices that connect our systems together to form a network.
Switches
Devices that connect networks to networks.
Routers
Threat agents that must maintain persistent access to an organization for perhaps an extended period of time, in order to achieve a longer term goal.
APT - advanced persistent threat
An attack against a router that results in the service of the device being denied.
DoS - denial of service