Security Architecture: Secure Communication and Access Flashcards

1
Q

Whare the 5 key elements of Secure Access?

A

Remote access in modern enterprise networks refers to the capability of authorized users to securely connect to the organization’s internal resources and services from outside locations, often using the internet as the conduit. This functionality has become increasingly crucial as businesses adopt flexible work arrangements and decentralized operations. Remote-access methods and protocols include:

VPNs

TLS

IPSec

SD-WAN

SASE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s VPN?

A

A VPN establishes a secure and encrypted connection over a public or untrusted network, such as the internet, thereby allowing users to access and transmit data as if they were directly connected to a private network. By creating a virtual tunnel between the user’s device and a VPN server, VPNs ensure privacy, anonymity, and data integrity, and they effectively shield online activities from potential eavesdropping, censorship, or cyber attacks.

  • Site to Site
  • Or remote access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s TLS?

A

Transport Layer Security (TLS) is a cryptographic protocol that ensures secure communication over computer networks, most commonly the internet. It functions by establishing an encrypted and authenticated connection between two parties, typically a client (such as a web browser) and a server (such as a website), thereby safeguarding the confidentiality and integrity of data exchanged during online interactions.

TLS employs a combination of asymmetric and symmetric encryption techniques to secure the data transmission, preventing unauthorized access, data tampering, and eavesdropping.

Built on top of SSL

This gives the function of HTTPS

Clientless VPN:

Clientless SSL VPN creates a secure, remote-access VPN tunnel to an ASA using a web browser without requiring a software or hardware client. It provides secure and easy access to a broad range of web resources and both web-enabled and legacy applications from almost any device that can connect to the Internet via HTTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s IPsec?

A

Internet Protocol Security (IPSec) is a comprehensive suite of protocols and algorithms used to secure and authenticate IP communication at the network layer. It offers a framework for creating encrypted and authenticated connections between devices, such as routers or VPN gateways, to ensure the confidentiality, integrity, and authenticity of data transmitted over potentially untrusted networks such as the internet.

Anything running on IPSec needs to support IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s SD-WAN?

A

SD-WAN, short for software-defined wide area network, is a technology that enhances and simplifies the management of wide area networks (WANs) by leveraging software-defined principles to optimize the routing and distribution of network traffic. It allows organizations to efficiently connect and manage geographically dispersed locations, such as branch offices or data centers, by dynamically choosing the most appropriate and efficient pathways for data transmission.

SD-WAN solutions often utilize a combination of public internet, private connections, and cellular networks, prioritizing critical applications and ensuring optimal performance through features like Quality of service (QoS) and traffic shaping.

https://www.youtube.com/watch?v=R5TV6lO3-1M

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s SASE?

A

Secure Access Service Edge (SASE) is a modern network architecture that integrates network security and WAN capabilities into a unified cloud-based platform. By converging traditionally disparate functions such as firewalling, secure web gateways, VPNs, and more, SASE offers a holistic approach to network security and connectivity.

SASE emphasizes delivering security and networking services as a service from the cloud, allowing organizations to provide secure access to applications and data for both on-premises and remote users, regardless of their location. SASE adapts security policies based on user context and application requirements, ensuring a dynamic and scalable security posture.

https://www.youtube.com/watch?v=Y8DBQ2dSZag
https://www.youtube.com/watch?v=Opy9D-8eyVg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly