3.2 Enterprise Infrastructure Security Principles Flashcards
Infrastructure Considerations
Security Zones:
Segmenting networks to isolate sensitive resources.
Device Placement: Strategic placement of devices to minimize risk.
Attack Surface: Identifying and mitigating potential attack vectors.
Failure Modes: Understanding device and system failures.
Network Appliances
Firewalls
Filtering network traffic.
Intrusion Detection Systems (IDS): Monitoring network traffic for threats.
Intrusion Prevention Systems (IPS): Blocking attacks in real-time.
Load Balancers: Distributing network traffic.
Proxy Servers: Intermediary servers for filtering and caching.
Port Security
IEEE 802.1X: Port-based network access control.
Extensible Authentication Protocol (EAP): Authentication framework.
Virtual Private Networks (VPNs)
IPsec:
Protocol suite for securing IP communications.
Site-to-Site VPNs: Connecting remote sites securely.
Remote Access VPNs: Enabling remote access to networks.
Transport Layer Security (TLS)
Encryption:
Protecting data in transit.
Authentication: Verifying the identity of the server.
Integrity: Ensuring data integrity.
Software-Defined Wide Area Networks (SD-WAN)
Centralized Network Management:
Simplifying network management.
Dynamic Routing: Adapting to network changes.
Improved Performance: Optimizing network traffic.
Secure Access Service Edge (SASE)
Unified Security Platform:
Combining network security and security services.
Cloud-Delivered Security: Providing security services from the cloud.
Zero-Trust Security Model: Enforcing strict access controls.