Definition: the practice of layering defenses to provide added protection.
defense in depth.
Many current security controls and architectures were developed with the concept of a security perimeter.
These models are network- or system-centric as opposed to data-centric.
The Internet perimeter should:
The perimeter should also provide protection for virtual private networks (VPNs):
Modern IT architectures are usually ________ and __________.
decentralized and deperimeterized
As a consequence of decentralized and deperimeterized, both the number of potential attack ______ outside the organizational boundary and the number of attack ______ have grown.
targets and vectors .
Models of security architecture typically fall into two categories:
process models – flexibility
framework models – directive
the Zachman framework and the Sherwood Applied Business Security Architecture (SABSA) framework share a similar approach of developing a
who, what, why, where, when and how matrix
SABSA Security Architecture Matrix viewpoints
The Open Group Architecture Framework (TOGAF) objective is to ensure
In the Open Systems Interconnect (OSI) model for networks, each layer performs a specific function for the network:
Physical Layer—Manages signals
Data Link Layer–Divides data into frames > physical layer
Network Layer—Translates addresses & routes data Transport Layer—data transferred in the correct sequence
Session Layer— manages user connections
Presentation Layer–Formats, encrypts and compresses
Application Layer—Mediates between software applications and other layers of network services
TCP/IP
Transmission Control Protocol/Internet Protocol
The TCP/IP suite includes both _______ protocols and _______ protocols.
network-oriented and
application support
Name 3 types of defense in depth:
defense in depth is from an architectural perspective of:
Horizontal defense in depth - controls placed in path (functionally equivalent to concentric ring model)
Vertical defense in depth - controls placed in layers
A _______ is defined as a system or combination of systems that enforces a boundary between two or more networks. They control the most vulnerable point between a corporate network and the Internet, and they can be as simple or complex as the corporate information security policy demands.
firewall
There are many different types of firewalls, but most of them enable organizations to:
Generally, the types of network firewalls fall into three categories:
Packet headers contain information, including the _____ and ______.
IP address of the sender and receiver, and the port numbers (application or service)
Packet filtering firewalls are therefore best suited for smaller networks, because the direct exchange of packets is permitted between outside systems and inside systems, the potential for an attack is determined by the total number of hosts and services.
True.
Advantages of packet filtering firewalls:
Simplicity of one network “choke point”
Minimal impact on network performance
Inexpensive or free
Disadvantages of packet filtering firewalls:
Vulnerable to attacks from improperly configured filters
Vulnerable to attacks tunneled over permitted services
All network systems vulnerable when a single packet filtering router is compromised
Some of the more common attacks against packet filter firewalls are:
IP spoofing
In this type of attack, the attacker fakes the IP address of either an internal network host or a trusted network host. This enables the packet being sent to pass the rule base of the firewall and penetrate the system perimeter. If the spoofing uses an internal IP address, the firewall can be configured to drop the packet on the basis of packet flow direction analysis. However, attackers with access to a secure or trusted external IP address can spoof on that address, leaving the firewall architecture defenseless.