Security Architecture 3.2 Flashcards
Device Placement
Firewalls - Separate the network. Trusted from untrusted.
Honeypots, jump server, load balancers, sensors - help to contribute to a more secure computing environment.
Security Zones.
Zone-based security technology.
Separate each area of the network such as an internal, external zone or Trusted or untrusted zone.
Attack Surface
What parts of the network are vulnerable?
- Application code
-Open ports
-Authentication Process
-Human error
Goal is to Minimise the attack surface
Connectivity
Everything contributes to security.
Secure Network cabling, Application-level encryption.
Network-Level Encryption. (VPNs)
IPS Intrusion Prevention System
Designed to watch traffic traversing the network. The IPS blocks anything it determines as an intrusion from gaining access into the network.
IDS intrusion detection system.
Failure mode:
Fail open - When the system fails data will continue to flow without security.
Fail close - When the system fails data does not flow. Very secure.
Active monitoring vs Passive monitoring.
Active monitoring is inline with the traffic and can prevent traffic it seems to be malicious before it reaches the switch.
Passive monitoring examines a copy of the traffic and sends it to the IPS. (SPAN, Network tap). Not inline so cannot prevent the malicious traffic from reaching the network.
Jump Server
A device on the inside of the network which is accessible from the outside. Usually hardened with security.
A jump server can be a significant security breach.
Proxy Server
Internal devices communicate to a proxy server and the proxy server then communicates to the internet. Receives the user requests on their behalf.
Proxies - URL filtering.
Some proxies are invisible.
Application Proxies
Understands the protocols used for a specific application.
Forward Proxy
A user sends a request to the proxy and the proxy sends the request to the internet. If everything looks okay once the internet sends the response back to the proxy it will forward on the results to the user.
Reverse Proxy
Users on the internet want to communicate with a webserver on an internal network. Any malicious traffic can be dropped at the proxy instead of being sent over to the web server.
Proxy can also provide a caching function where previous results are saved in the cache. Identical user requests made by the proxy will not be sent to the webserver.
Open Proxy
A third-party, uncontrolled proxy. The third party could add malicious code or adverts to messages.
Load Balancing
Distributes the load between multiple servers.
Increases fault tolerance - if a server connected to a load balancer was to fail. The load balancer would distribute the load between the remaining servers.
Features of a Active/ Active load balancer.
Configurable load - can manage the load across multiple servers
TCP offload - lowers the protocol overhead
SSL - encryption done within the load balancer so each server does not need to end encrypted files.
Caching - saves previous entries and responses for faster replies
Prioritisation - Certain applications have higher prioritisation.
Content switching - recognise the type of request being made and can make certain