Security Architecture: Network Appliances Flashcards

1
Q

List all the network appliances that is used today?

A

Jump servers.

Proxy servers.

Intrusion prevention system (IPS) and intrusion detection system (IDS).

Load balancers.

Sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a jump server?

A

Jump servers

Also known as a jump host or bastion host, jump servers are a pivotal component in network-security architecture. They serve as an intermediary access point between different security zones, typically within a secure network and an external network, such as the internet. This isolated and highly secured server acts as a gateway for administrators and authorized users to access sensitive systems and resources residing in protected areas.

Very reduced attack surface.

Does only one particular task to minimize vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a proxy server?

A

Proxy servers

A proxy server functions as an intermediary between client devices and other servers on the internet. When a client sends a request for a resource, the proxy server intercepts the request and forwards it to the destination server. This setup provides several benefits, including enhanced privacy, security, and performance optimization.

Proxy servers can mask the identity and location of the original requester, adding a layer of anonymity.

Proxy servers were used as a firewall

Mostly known for a intermediate to access web pages on behalf of the host

Netflix in the UK

Forward Proxy meaning eg Attempting to access acilearning.com Proxy server uses that request validates that it is from the destination source and then forwards it back to the host (can content filter also)

A reverse Proxy is when you go directly to acilearning.com and then goes through to Proxy on retrieval back to the host

Caching capabilities – How fresh or how stale can you take your content – When the info is constantly changing proxy server will be in tune dump that info.

White list and black/list - Include and exclude – Type of filtering system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is IPS and IDS?

A

IPS and IDS

An intrusion prevention system (IPS) device is a crucial element of modern cybersecurity architecture designed to actively identify, prevent, and respond to unauthorized or malicious activities within a network environment.

Positioned strategically within the network, an IPS device constantly monitors incoming and outgoing traffic, analyzing it for patterns and signatures indicative of known attacks, vulnerabilities, or suspicious behavior. Upon detection, an IPS can take immediate action to block, quarantine, or alert administrators about the potential threat, thereby helping prevent cyber attacks, data breaches, or other security incidents.

An intrusion detection system (IDS) can identify that an attack is taking place and notify you, but doesn’t take action to mitigate an attack like an IPS.

Note: Many devices today have both IPS and IDS capabilities.

IDS – passive

IPS – active

Most will do at least three methodologies

Static definition – here is the parameters of attacks I just learned; Look for this in incoming traffic – Can stop or alarm

Signature based detections – Appliance will reach out to a data base with the known attacks that will continuously update on new attacks – Can stop or alarm

AI base definition – Machine will recognize the patterns of packets and behaviors through communication. Over time the machine will learn it and if there are any anomalies in the patterns it will stop it.

Lots of false positives and it will take a while sync in:

True Positives

False Negatives

True Negatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a load balancer?

A

Load balancers

A load balancer is a pivotal networking component that’s vital for distributing incoming network traffic across multiple servers or resources. Its primary objective is to optimize the utilization of available resources, enhance performance, and ensure high availability of applications or services. A load balancer helps prevent any single server from being overwhelmed by evenly distributing incoming requests. This helps mitigate the risk of downtime or performance bottlenecks.

Key element is to make sure all traffic are still going through security check points (not by-passing)

Types of load balancing:

Round Robin: Send first request to the first, Send next data to the second, send next to third etc

Weighted: One is busy lets send it to the next available server

Random: Is Random

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are sensors?

A

Sensors

A sensor in a network is a specialized device or software component designed to collect and monitor various types of data and activities within the network environment. Acting as an observant node, sensors continuously gather information about network traffic, user behavior, system performance, and potential security threats. This data is then analyzed and processed to provide insights into the network’s overall health, usage patterns, and potential vulnerabilities.

Sensors play a crucial role in enhancing network management, security, and optimization by enabling real-time detection of anomalies, breaches, or unusual behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly