3.2 Secure Infrastructures Flashcards

(5 cards)

1
Q

Device Placement

A

Every network is different– There are often similarities
* Firewalls– Separate trusted from untrusted– Provide additional security checks
* Other services may require their own security technologies– Honeypots, jump server, load balancers, sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Zones

A

Zone-based security technologies– More flexible (and secure) than IP address ranges
* Each area of the network is associated with a zone– Trusted, untrusted– Internal, external– Inside, Internet, Servers, Databases, Screened
* This simplifies security policies– Trusted to Untrusted– Untrusted to Screened– Untrusted to Trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack surface

A
  • How many ways into your home?– Doors, windows, basements
  • Everything can be a vulnerability– Application code– Open ports
  • Authentication process– Human error
  • Minimize the surface– Audit the code– Block ports on the firewall– Monitor network traffic in real-time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Connectivity

A
  • Everything contributes to security– Including the network connection
  • Secure network cabling– Protect the physical drops
  • Application-level encryption– The hard work has already been done
  • Network-level encryption– IPsec tunnels, VPN connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security zones (see example in notes)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly