Please enable JavaScript.
Coggle requires JavaScript to display documents.
Section 3: Security Architecture Principles (Topic 2: OSI Model (Physical…
Section 3: Security Architecture Principles
Topic 1: Overview of Security Architecture
Definition
Structure, components, connections and layout
of security controls within an organization’s IT infrastructure
Models of Cybersecurity
System or Network-centric models
Data centric models
Security Architecture Model
Process Model
Framework Model
Topic 2: OSI Model
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Topic 3: Defense in Depth
Horizontal
Vertical
Topic 4: Information Flow Control
Firewalls
Combination of systems that enforces a boundary between multiple networks
Technologies
Packet Filters
Stateful Inspection
Application Proxy
Next Generation Firewall
Web Application Firewalls (WAF)
apply rules to specific web application
operates at level 7
Topic 5: Isolation and Segmentation
Purpose
Control, monitor and protect segments seperately
VLAN
No additional encryption
Set up by configuring ports on a switch
Set up based on logical rather than physical connections
Topic 6: Logging, Monitoring and Detection
Data Loss Prevention Software
Data at rest: Log where file types are stored
Data in transit: Analyze data for sensitive content
Data in use: Manage information sent to printers, thumb drives and clipboard
Security Event Management (SEM)
Aggregates and correlates security event log data accross multiple security devices
Security Information and Event Management (SIEM)
Historical analysis feature of SEM
Reporting feature of Security Information Management (SIM)
Antivirus and Anti-Malware
Intrusion Detection System
Network based
Host-based
Intrusion Prevention System
Limits damage to attacked systems
Must be properly configrured
Topic 7: Encryption Fundamentals, Techniques and
Applications
Types
Symmetric Encryption
Asymmetric Encryption
Definition
Converting plain text to ciphertext using cipher and key
Digital Signature
Data integrity
Authentication
Non-repudiation
Applications
Email
Internet Transactions