Infrastructure Considerations
Secure Communications
Network Appliances
Firewall Types
Effective Controls
100

Put closer less latency, put further away more security

What is device placement

100

the technology that enables secure, encrypted communication between two endpoints

What is a VPN?

100

a network system used to access and manage devices within a separate security zone

What is a jump server? 

100

firewalls for web applications that protect their servers.

What are Web Application Firewalls 

100

implementing multifactor authentication, role-based access control, and network segmentation to restrict access to sensitive data

What are access controls 

200

We divide a network into these

What are security zones?

200

allows for a remote user to connect to an internal network using encrypted communications

What is remote access VPN 

200

an intermediate point between the user and the service they are trying to access.

What is a proxy server

200

This firewall combines a bunch of techniques into one powerful tool.

What is a Next-generation firewall?

200

Deploy firewalls, intrusion detection/prevention systems (IDS/IPS), and secure protocols like TLS to protect your network perimeter.

What is network security

300

Offer fewer of these and your system is more secure

What are attack surfaces?

300

cryptographic protocol that secures communication between two endpoints

What is Transport Layer Security (TLS)

300

The majority of networking and security professionals have these and collectors placed in their network.

What are sensors 

300

Similar to the NGFW, this is when multiple firewall tools are combined into one tool. These are stronger than a single tool being used by itself

What are Unified Threat Management(UTM)?

300

Use anti-virus and anti-malware software, endpoint detection and response (EDR) solutions, and data encryption to protect devices

What is endpoint security?

400

A device that is in line and can control the system.

What is an active device?

400

provides VPN between endpoints by encrypting every packet individually

What is IPSeC? (Internet protocol security)

400

identifies  when an attack is occurring and then notify an end user.

What is an IDS

400

These firewalls operate on the transport layer inspecting and controlling data packets based on source and destination ports, protocols

What are layer 4 Firewalls?

400

Educate employees about cyber threats and best practices to minimize human error and phishing risks.

What is Security awareness and training 

500

If it fails this way, the network still works 

What is fail open?

500

flexible software overlay that sits on top of multiple WAN connections

What is Software-defined Wide Area Network (SD-WAN)/

500

identify when an attack is occurring and then stops it 

What is intrusion protection system?

500

This are also known as “deep packet inspection” firewalls

What are layer 7 firewalls? 

500

Developing a plan for identifying, containing, and mitigating security incidents to minimize damage and recovery time

What is incident response?