Secure Network Architecture Flashcards
Network hardening
The process of securing a network by reducing it’s potential vulnerabilities through configuration changes and taking specific steps
Implicit Deny
A network security concept where anything not explicitly permitted or allowed should be denied
Analysing logs
The practice of collecting logs from different network and sometimes client devices on your network, then performing an automated analysis on them
Logs analysis systems
Are configured using user-defined rules to match interesting or atypical log entries
Normalizing log data
Is an important step, since logs from different devices and systems may not be formatted in a common way
Post fail analysis
Investigates how a compromise happened after the breach is detected
Flood guards
Provides protection against DoS attacks
Rogue DHCP server attack
DHCP snooping
EAP-TLS
An authentication type supported by EAP that uses TLS to provide mutual authentication of both client and the authenticating server