Security Architecture (Chapter 3) Flashcards

1
Q

Network Segmentation

A

Is splitting a network into separate segments to create a “security zone”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trunk link

A

Are links between switches that allows VLANs to extend over multiple switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical segmentation of a network

A

Air-gap
- Is the process of segmenting a portion of a network so that it has no connection to the network.
- most secure
- vulnerability: Removable media, Environmental control compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VLAN Segmentation

A

Is segmenting a network over switches by dividing the ports up into VLANs
- Can be extended over multiple switches via trunk links
- Vulnerability: VLAN hopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

High Availability

A

Refers to a system that continuously operates, with no downtime.
- accomplished by having multiple redundancy features, to allow for components failure and repairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clustering

A

Having 2 or more hosts that act as a single unified system, that s
Share data and run the same service
- hosts needs to have a link between eachother for ‘heartbeat’ communication
- each host has it’s own IP address and MAC address
- the cluster itself has a separate IP address and MAC address, which the DNS uses
- active/standby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Load balancing

A

Multiple hosts that act as a single system, that runs the same service but doe not share data
- clients connect to a load balancing application that forwards request to the service hosts
- hosts have separate IP and MAC address
- load balancer has itself a IP and MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Replication

A

Similar to load balancing but does not share a common name, IP address or MAC address and are often on separate networks, each server runs a copy of the service and data are replicated across the servers.
- eg Directory Domain Controllers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtualization

A

Is creating multiple systems (Virtual Machines) that runs on a singular machines that can utilize all of th machines resources making it more efficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virtual Desktop Infrastructure (VDI)

A

Aka thin client
Is a virtualization infrastructure that creates multiple virtual desktop for each users that is run off of a server.
The user connects to the server via a VPN link and all applications and data are stored in the VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Software Defined Networking (SDN)

A

A virtual network, that uses software based controllers that communicates with underlying hardware infrastructure, direct traffic on a network.
Allows for VMs to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Containerization

A

Is a lightweight Virtual Machine that has everything it needs to run a specific apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Infrastructure as Code (IaC)

A

The managing and provisioning of infrastructure (servers) through code instead of manual processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Serverless Architecture

A

A way of building and running applications and services without having to manage the infrastructure (servers, VLAN, ect)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Microservices

A

An organisational approach to software development that is composed of small independent services that communicate over well defined APIs. Having independent services allows each service to be independently updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IoT Architecture

A

End devices
- devices with sensors that gather telemetry data
IoT Gateway
- gateway to connect IoT to other devices on a network
Data System
-Allows the IoT devices to connect, store and process telemetry data
Remote Control
- apps can be used to access IoT devices remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RTOS System

A

Real-time Operating System are systems that accepts and performs process within a short amount of time (1/10 of a second).
-Used in mission critical applications that overrides other processes including security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Embedded systems

A

A system in which avcomputer is included as an integral part of an overall system

19
Q

Reducing Attack Surface

A
  • Maintain consistent policies
  • defense-in-depth
  • zero Trust
  • endpoint protection protects the network from the devices
20
Q

Failure Modes

A

Fail Closed
- mode that if a system detects a failure the system will shut down and stop functioning.
- used to secure the device
Failed Open
- a mode that if a system detect a failure the system will continue to work as intended
- used when access is more important than security

21
Q

Web application Firewall (WAF)

A

Used to inspect web traffic and blocks malicious traffic
- needs decryption certificate so it can inspect HTTPS

22
Q

Unified Threat Management (UTM)

A

A multi-purpose appliance that contains a firewall, VPN server, Antivirus and other security features

23
Q

Next-generation Firewall (NGFW)

A

A firewall that performs deep packet inspection (can look into the payload of traffic)

24
Q

Layer 4 firewall

A

A firewall that doesn’t inspects application-layer payloads but looks at the encapsulation headers

25
Q

Layer 7 firewall

A

A firewall that looks at all layers of TCP/IP

26
Q

Stateless Firewall

A

A firewall that is set up to inspect every packet and is compared to a list of rules
- has no memory of previous packets
- best used for when high performance is critical

27
Q

Stateful Firewall

A

A firewall the inspects packets and compares them with a list of rules.
- it maintains a state table for every connection which is used to verify that connection is legit
- filters packet at the network and transport layer

28
Q

Circuit-level Gateway

A

Works at session Layer (layer 5)
- allows/disallows entire connections as opposed to individual packets

29
Q

Application level Gateway

A

Filters packets at the application Layer (layer 7), and examines the payload

31
Q

Types of Intrusion Detection Systems

A

Network based
- NIDS (network intrusion detection system)
- NIPS (Network intrusion prevention system)
- a separate system on the network that monitors the traffic on the network for any malicious activities
Host Based
-HIDS (Host-based Intrusion Detection Systems)
- HIPS (host-based prevention system)
- application on a host system that audits events and monitors of malicious activity on the host

32
Q

Network Intrusion Detection

A

Signature Based
- uses a list ‘signatures’ of a previously used attacks to detect an attack
- is only protected against known attacks and not 0-Days
Anomaly-Based
- Uses a previously created baseline of the network activity to detects any anomalies that could be malicious
- Prone to false positives

33
Q

NIDS

A

Network Intrusion Detection Systems
- a passive monitoring system that monitors traffic when it passes a IDS sensors which is then compared to a rule set
- if traffic matches a rule then it’s logged and an alert can be triggered

34
Q

NIPS

A

Network Intrusion Prevention System
- an active monitoring and control system that compares traffic to ‘signatures’
- if a signature is matched packet is dropped

35
Q

Host-based HIDs/HIPs

A

Software based Intrusion systems are installed on a host system and only monitors the activity of that host.
HIDs - logs suspicious activity
HIPs - prevent suspicious activity

36
Q

WiFi IPs

A

Wireless intrusions prevention system
- monitors the radio spectrum for the presence of unauthorized access points and automatically implements countermeasures is detected

37
Q

Proxy

A

A server that fetches data on behalf of a client, thus hiding the clients information.
Forward Proxy - fetches data from the internet
Reverse Proxy - fetched data from a private network

38
Q

Jump server

A

A secure system that spans two or more networks allowing a connected client to ‘jump’ onto another network

39
Q

VPN

A

Virtual Private Network
- a mechanism that creates a secure connection over an unsecured network
- traffic is encrypted before transmission

40
Q

TLS

A

Transport Layer Security
A secure means of transmitting traffic on a network by encrypting the Payload for an HTTPs connection (port 443)

41
Q

IP Security

A

Most common type of VPN thatbises Internet Key Exchange to negotiate a session.
consists of 2 protocols
- Authentication Header
- Encapsulating Security Payload
As well as it’s ability for Tunneling and Transport (Encryption)

42
Q

IPSEC Transport mode

A

Host-to-Host VPN

43
Q

IPSEC Tunnel Mode

A

Router-to-Router VPN used for site to site connection