5.0 Network Architecture Flashcards
The selection and placement of media, devices, protocols/services, and data assets.
Network architecture
The media, appliances, and addressing/forwarding protocols that support basic connectivity.
Network infrastructure
Provides the addressing mechanism for logical networks and subnets.
Internet Protocol (IP)
All the points at which a threat actor could gain access to hosts and services.
Attack surface
this is a box with ports for incoming and outgoing network cabling and an inductor or optical splitter that physically copies the signal from the cabling to a monitor port. There are types for copper and fiber optic cabling
Test access point (TAP)
this means that the sensor is attached to a specially configured port on a switch that receives copies of frames addressed to nominated access ports (or all the other ports). This method is not completely reliable. Frames with errors will not be mirrored , and frames may be dropped under heavy load.
SPAN (switched port analyzer)/mirror port
control is one that does not require any sort of client or agent configuration or host data transfer to operate. For example, network traffic can be directed or copied to a sensor and scanned by an analysis engine
passive security
that performs scanning must be configured with credentials and access permissions and exchange data with target hosts. An _____ that performs filtering requires hosts to be explicitly configured to use the control. This might mean installing agent software on the host or configuring network settings to use the control as a gateway
active security control
Portions of the network or system that have specific security concerns or requirements.
Security zone
A network that does not require a physical connection.
Wireless network
A network that grants internet access only to guest users. A guest network has a firewall to regulate guest user access.
Guest network
A host (honeypot), network (honeynet), file (honeyfile), or credential/token (honeytoken) set up with the purpose of luring attackers away from assets of actual value and/or discovering attack strategies and weaknesses in the security configuration.
Honeynet
A decentralized network that allows connections without a traditional base station or router. It allows users to connect two or more devices directly to each other for a specific purpose.
Ad hoc
A temporary DNS record that redirects malicious traffic to a controlled IP address.
DNS sinkhole
A hardened server that provides access to other hosts.
Jump server
Agent-based web filtering involves installing a software agent on desktop computers, laptops, and mobile devices. The agents enforce compliance with the organization’s web filtering policies.
Agent-based filtering
A network that contains publicly accessible resources and is located between the private network and an untrusted network, such as the internet. It is protected by a firewall.
Screened subnet
A _______ acts on behalf of a client or user when attempting to access resources over the internet. The _______, in this position of an intermediary, provides a layer of protection to the client. A ______ works on a store-and-forward model. This means the ______deconstructs each packet, performs analysis, then rebuilds the packet and forwards it on, if it conforms to the rules it’s been configured with. Client computers connect to a specified point on the perimeter network for web access.
Benefits a ________ can provide:
Traffic management
Protection
Anonymity for users by masking their IP addresses
Caching engines
Content filtering
Content monitoring
Incoming network traffic distribution across multiple servers to help balance the load
Proxy server
Internet content filter
Internet content filter
Deception strategy that returns spoofed data in response to network probes.
Fake telemetry
An appliance that combines many security functions into a single device.
All-in-one
security appliance
A device that has the ability to analyze and manage network traffic based on the application-layer protocol.
Application-aware devices
A ______ is a hardened server that provides access to other hosts. ________ are often used for administrative tasks where administrators connect to the _______ first and then use it to access other internal systems, like servers or devices. A ________ is primarily used to enhance security by controlling access to sensitive resources. It acts as a gateway to access certain systems that are kept isolated from the external network. The ________ is typically locked down and secured to a higher degree, ensuring that only authorized users can access it, reducing the risk of unauthorized access to critical systems.
Jump server
A ________, while primarily used to distribute network traffic across multiple servers to optimize performance, can also serve as a security appliance in certain scenarios. A ______ distributes client requests across available server nodes in a farm or pool. This is used to provision services that can scale from light to heavy loads and to provide mitigation against denial-of-service attacks.
Load balancer