3.2 Implement secure network architecture concepts Flashcards
Zones/topologies
A network specification that determines the network’s overall layout, signaling, and dataflow patterns.
DMZ
(Demilitarized Zone) A small section of a private network that is located behind one firewall or between two firewalls and made available for public access.
Extranet
A private network that provides some access to outside parties, particularly vendors, partners, and select customers.
ex. Sharepoint
Intranet
A private network that is only accessible by the organization’s own personnel.
Honeynets
An entire dummy network used to lure attackers.
NAT
(Network Address Translation) A simple form of Internet security that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-routable addresses internally.
Ad hoc network
A type of wireless network where connected devices communicate directly with each other instead of over an established medium.
Segregation/segmentation
A situation where hosts on one network segment are prevented from or restricted in communicating with hosts on other segments.
Logical (VLAN)
(Virtual local are network) A logically separate network, created by using switching technology. Even though hosts on two VLANs may be physically connected to the same cabling, local traffic is isolated to each VLAN so they must use a router to communicate.
Virtualization
The process of creating a simulation of computing environment, where the virtualized system can simulate the hardware, operating system, and applications of a typical computer without being a separate physical computer.
Air Gaps
A type of network isolation that physically separates a network from all other networks.
Tunneling/VPN
The practice of encapsulating data from one protocol for safe transfer over another network such as the Internet.
Site-to-site VPN
Connects two or more local networks, each of which runs a VPN gateway
Remote access
A server configured to process remote connections.
Collectors
SIEM software features that store and interpret logs from different types of systems.