Section 3: Security Architecture Flashcards
Describes the structure, components, connections, and layout of security controls within an organization’s IT infrastructure
Security architecture
The practice of layering defenses to provide added protection
Defense in depth
A well-defined boundary between the organization and the outside world
Perimeter
Security model that emphasizes placing controls at the network and system levels to protect the information stored within
Network- or system-centric
Security model that emphasizes the protection of data regardless of its location
Data-centric
Perimeter that ensures secure access to the Internet for enterprise employees and guest users residing at all locations, including those included in telecommuting or remote work
Internet perimeter
True or false: VPN traffic is first filtered at the ingress point to the specific IP addresses and protocols that are part of the VPN service.
False: VPN traffic is first filtered at the egress point to the specific IP addresses and protocols that are part of the VPN service.
True or false: Modern IT architectures are usually decentralized and deperimeterized.
True
True or false: In distributed and decentralized architectures, the inherent risk is likely to increase, often as a function of moving critical applications, platforms, and infrastructure elements into the cloud.
False: In distributed and decentralized architectures, the THIRD-PARTY RISK is likely to increase, often as a function of moving critical applications, platforms, and infrastructure elements into the cloud.
Security architecture approach that develops a matrix showing columns that represent aspects of the enterprise that can be described or modeled and rows representing various viewpoints from which those aspects can be considered
Sherwood Applied Business Security Architecture (SABSA) Matrix
Security architecture approach that addresses security as an essential component of the overall enterprise design
The Open Group Architecture Framework (TOGAF)
Arrange the following layers of the OSI model from the bottom to the top layer:
\_\_ Data Link \_\_ Application \_\_ Session \_\_ Physical \_\_ Network \_\_ Presentation \_\_ Transport
Layer 1. Physical Layer 2. Data Link Layer 3. Network Layer 4. Transport Layer 5. Session Layer 6. Presentation Layer 7. Application
Please Do Not Tell Secret Password 2 All
All People Seem To Need Data Protection
OSI layer that manages signals among network systems
Physical Layer
OSI layer that divides data into frames that can be transmitted by the physical layer
Data Link Layer
OSI layer that translates network addresses and routes data from sender to receiver
Network Layer
OSI layer that ensures data are transferred reliably in the correct sequence
Transport Layer
OSI layer that coordinates and manages user connections
Session Layer
OSI layer that formats, encrypts, and compresses data
Presentation Layer
OSI layer that mediates between software applications and other layers of network services
Application Layer
Which of the following protocols reside at the application layer of the OSI model? Select all that apply.
a. HTTP
b. FTP
c. SMTP
d. NetBIOS
e. ARP
a. HTTP
b. FTP
c. SMTP
In the OSI model, physical addressing takes place in:
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
b. Layer 2 - Data Link Layer
Which of the following reside at the Physical layer of the OSI model? Select all that apply.
a. Router
b. Hub
c. Switch
d. Network cabling
e. Bridge
b. Hub
d. Network cabling
In the OSI model, data compression takes place in:
a. Layer 1
b. Layer 4
c. Layer 6
d. Layer 5
c. Layer 6 - Presentation Layer
Which OSI layer assumes responsibility for managing network connections between applications?
a. Layer 1
b. Layer 4
c. Layer 6
d. Layer 5
d. Layer 5 - Session Layer
What is the name of the data unit used at the OSI physical layer?
a. Bit
b. Frame
c. Packet
d. Segment
a. Bit
What is the name of the data unit used at the OSI data link layer?
a. Bit
b. Frame
c. Packet
d. Segment
b. Frame
What is the name of the data unit used at the OSI network layer?
a. Bit
b. Frame
c. Packet
d. Segment
c. Packet
What is the name of the data unit used at the OSI transport layer?
a. Bit
b. Frame
c. Packet
d. Segment
d. Segment
What is the name of the data unit used at the OSI session layer?
a. Data
b. Frame
c. Packet
d. Segment
a. Data
What is the name of the data unit used at the OSI presentation layer?
a. Data
b. Frame
c. Packet
d. Segment
a. Data
What is the name of the data unit used at the OSI application layer?
a. Data
b. Frame
c. Packet
d. Segment
a. Data
In the OSI model, Media Access Control (MAC) and Logical Link Control (LLC) sublayers are the components of:
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
b. Layer 2 - Data Link Layer
User Datagram Protocol (UDP) resides at which OSI layer?
a. Layer 4
b. Layer 5
c. Layer 6
d. Layer 7
a. Layer 4 - Transport Layer
Routers operate at which OSI layer?
a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5
b. Layer 3 - Network Layer
IP addressing takes place at which OSI layer?
a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5
b. Layer 3 - Network Layer
Data encryption and decryption typically takes place at which OSI layer?
a. Layer 4
b. Layer 5
c. Layer 6
d. Layer 7
c. Layer 6 - Presentation Layer
Which of the following devices resides at the OSI data link layer?
a. Router
b. Passive hub
c. Ethernet switch
d. Repeater
c. Ethernet switch
Which of the following protocols resides at the OSI session layer?
a. HTTP
b. UDP
c. SMTP
d. NetBIOS
d. NetBIOS
Protocol suite used as the de facto standard for the Internet
TCP/IP
The process of adding addressing information to data as it is transmitted down the OSI stack
Encapsulation
A connectionless protocol used where speed is more important than error-checking and guaranteed delivery
User Datagram Protocol (UDP)
Type of defense in depth implementation that creates a series of nested layers that must be bypassed in order to complete an attack
Concentric rings (or Nested layering)
Type of defense in depth implementation where two or more controls work in parallel to protect an asset
Overlapping redundancy
Type of defense in depth implementation that compartmentalizes access to an asset, requiring two or more processes, controls or individuals to access or use the asset
Segregation or compartmentalization
Type of defense in depth implementation that is effective in protecting very high value assets or in environments where trust is an issue
Segregation or compartmentalization
Type of defense in depth implementation that is most effective when each control is different
Ovrelapping redundancy
Type of defense in depth implementation from an architectural perspective where controls are placed in various places in the path of access for an asset (e.g. concentric ring model)
Horizontal defense in depth
Type of defense in depth implementation from an architectural perspective where controls are placed at different system layers - hardware, operating system, application, database, or user levels
Vertical defense in depth
What are the three types of defense in depth implementations?
- Concentric Rings (or Nested Layering)
- Overlapping Redundancy
- Segregation or Compartmentalization
A system or combination of systems that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment
Firewall