Domain 3: Given a scenario, apply security principles to secure enterprise infrastructure Flashcards
Device Placement
Device placement in a network determines the strategic positioning of security, connectivity, and traffic management elements and serves as the blueprint for a network’s functionality and security.
Security Zone
Security zones, in essence, are distinct segments or partitions within a network.
Single Point of Failure
When you are deploying network appliances, ensure that you are not reliant on a single device lest it fail and take your entire network down with it. Look at building in resilience.
Fail Closed
fail-closed, which is a failure mode in which the security system defaults to a closed or blocked state when it encounters a problem or malfunction and is one of two options
Fail open
, a security system (such as a firewall or an access control mechanism) defaults to an open state when it encounters an issue or failure. Fail-open situations create a significant security vulnerability, as they permit unrestricted access
Active devices
Active devices are a proactive force within your network security arsenal.
Passive devices
Passive devices are observers. They monitor network traffic, analyze patterns, and provide insights into potential threats and vulnerabilitie
Inline
Inline devices are placed directly in the data path of network traffic. They actively process traffic as it flows through the network, making real-time decisions about whether to allow or block data packets.
Tap and monitor
Tap or monitor devices, as the name suggests, do not interfere with the flow of network traffic. Instead, they “tap” into the traffic and duplicate it for analysis or monitoring purposes
Web page caching
To reduce bandwidth usage and increase browsing speed, a proxy server can cache frequently accessed web pages. This means that instead of fetching the same content repeatedly from external servers, the proxy server stores a copy locally
Reverse Proxy
The flow of traffic from a reverse proxy is incoming traffic from the internet coming into your company network. The reverse proxy is placed in a boundary network called the screened subnet. It performs the authentication and decryption of a secure session to enable it to filter the incoming traffic.
Load balancer
As its name suggests, a network load balancer is a device that is used to balance the load when there is a high volume of traffic coming into the company’s network or web server.
Affinity
In this method, the Layer 4 load balancer distributes the load according to a preset affinity, meaning that the web server to which the request is sent is determined by the requester’s IP address. In other words, the request will always be sent to that same web server every time a request is submitted by that address (or others with the matching affinity)
DNS round robin
: In this method, when the request comes in, the load balancer contacts the DNS server and rotates the request in ascending numerical order, starting with the lowest IP address first. It rotates around Web 1, Web 2, and Web 3, and then keeps the sequence going by going back to Web 1 on a rotational basis. It cannot detect the status of the server and may therefore forward a request to a server that is down for maintenance.
Sticky MAC
Sticky MAC addresses simplify the port security process by storing the MAC addresses of authorized devices. When a device connects to a port, its MAC address is recorded and associated with that port.