Network Infrastructure Basics Review


Network Infrastructure Basics Review_第1张图片
Overview of infrastructure components

Infra component: Networks

Network Infrastructure Basics Review_第2张图片
1


Network Infrastructure Basics Review_第3张图片
2


Network Infrastructure Basics Review_第4张图片
Common enterprise network device providers


Server definition and server types


Network Infrastructure Basics Review_第5张图片
server basics

Type of server storage:

Network Infrastructure Basics Review_第6张图片
information from Year 2015

Enterprise storage

Network Infrastructure Basics Review_第7张图片
1

Information security


Network Infrastructure Basics Review_第8张图片
information security  basics

Security framework

Network Infrastructure Basics Review_第9张图片
framework

Security: defense in depth

Following are the explanation of each layer:


Network Infrastructure Basics Review_第10张图片
data and application layer


Network Infrastructure Basics Review_第11张图片
Server & Host

Note: what is intrusion protection system?

An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits. Vulnerability exploits usually come in the form of malicious inputs to a target application or service that attackers use to interrupt and gain control of an application or machine. Following a successful exploit, the attacker can disable the target application (resulting in a denial-of-service state), or can potentially access to all the rights and permissions available to the compromised application.

Reference:https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips


Network Infrastructure Basics Review_第12张图片
perimeter defense & internal network

Note: What is DLP?

Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. DLP software classifies regulated, confidential and business critical data and identifies violations of policies defined by organizations or within a predefined policy pack, typically driven by regulatory compliance such as HIPAA, PCI-DSS, or GDPR. Once those violations are identified, DLP enforces remediation with alerts, encryption, and other protective actions to prevent end users from accidentally or maliciously sharing data that could put the organization at risk. Data loss prevention software and tools monitor and control endpoint activities, filter data streams on corporate networks, and monitor data in the cloud to protect data at rest, in motion, and in use. DLP also provides reporting to meet compliance and auditing requirements and identify areas of weakness and anomalies for forensics and incident response.

So when shall we use DLP? 3 main use cases for DLP


Network Infrastructure Basics Review_第13张图片
3 use case


Network Infrastructure Basics Review_第14张图片
Outer most layer


A typical infra solution


Network Infrastructure Basics Review_第15张图片

你可能感兴趣的:(Network Infrastructure Basics Review)