Section 15.138 Network Infrastructure Flashcards
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
Network Infrastructure
Backbone of modern organisations which comprises hardware, software, services, and facilities for network support and
management
aka Air Gapping
Physical Separation
A security measure to protect sensitive information. (One of the most secure but not perfect)
■ Isolates a system by physically disconnecting it from all networks
■ Physical separation is one of the most secure methods of security, but it is still
vulnerable to sophisticated attacks
Example - Industrial Control System (ICS) used in critical infrastructure like power plants or water treatment facilitites to try an oprevent cyber attacks which could cause real world damage.
Logical Separation
Creates boundaries within a network to restrict access to certain areas
■ Implemented using firewalls, Virtual Local Area Networks, and network devices
VLANs can segreate network traffic ensuring data from one department cant be accessed by another despite being on the same physical network
Physical Separation (Air-Gapping) v Logical Separation
Comparison
Physical Separation (Air-Gapping)
● High security, complete isolation
Logical Separation
● More flexible, easier to implement
● Less secure if not configured properly