Dated: 12-11-2024
Ch02. Security Overlay of an Enterprise Architecture - 1
- How is the enterprise secured with the help of various components and security design?
Security Challenge | Location/Device | Security Solution |
---|---|---|
Perimeter Filtering | Edge Router | Access Lists & Various RFCs |
DDOS Attack | Edge Router/DDOS Protection Solution | DDOS Protection |
Zero-Day Attack / APT Attack | Edge Device / Edge NGN FW | Zero-Day/APT Attack Prevention |
Web Server Attacks | DMZ / Web Application FW | Web Application Attack Prevention |
Email SPAM & | DMZ / Email | Email Security |
Security Challenge | Location/Device | Security Solution |
Web-based User Attacks | DMZ / Web Security GW | Web Filtering & Malware Protection |
System Malware | System | AV |
User Network Access Control | At Aggregation Point Of User Access | Network Admission Control (NAC) |
User Controls For USB/Media, HDD Encrypt | System | Data Loss Prevention (DPL) - System Level |
Remote Branch Connectivity/ Malware | Intranet-Extranet Edge / UTM | Unified Threat Management (UTM) Solution |
Security Challenge | Location/Device | Security Solution |
Unauthorized Access / Malware | Data Center FW | Data Center FW Filtering & Malware Protection |
Data Exfiltration | Edge / Network DLP | Network DLP Solution |
Event Monitoring & Detection | Data Center / SIEM | Security Info. & Event Management |
Unpatched Systems | Data Center / VM | Vulnerability Scanner |
Server Integrity Monitoring & IPS Filtering | Data Center / HIPS | Host Intrusion Prevention System (HIPS) |