-
SNMP
Simple Network Management Protocol. A database of MIB management information base and OIDs Object Identifiers. Poll devices over udp/161.
-
SNMP v1
Structured tables. No encryption.
-
SNMP v2
Data type enhancements, bulk transfers, but no encryption.
-
SNMPv3
Message integrity, authentication, and encryption.
-
-
SNMP traps
Device monitors itself and sends alerts over udp/162. User needs to set a threshold for alerts.
-
Audit logs
What did the device / application do. When did they do it.
-
Syslog
Standard for message logging.
-
SIEM
Security Information and Event Manager. Gets data from the syslogs.
-
Runts
Frames that are less than 64 bytes. May be the result of a collision.
-
Giants
Frames that are more than 1518 bytes.
-
CRC Error
Cyclic redundancy error. Failed frame check sequence. May indicate a bad cable or interface.
-
Encapsulation error
Inconsistent configurations between switches such as ISL or 802.1Q
-
Netflow
Gather traffic statistics from all traffic flows. Shared communication between devices.
-
COOP
Continuity of operations planning. When things do not go according to plan. Examples include writing down manual transactions.
-
System Life Cycle
Managing asset disposal. In some organizations data can’t be legally destroyed.
-
AUP
Acceptable use policy. Detailed documentation on acceptable use of company assets. May be documented in the rules of behavior.
-
BYOD
Bring your own device. The company manages certain features and applications on the device. MDM recommended.
-
Remote access policies
For employees working offsite.
-
DLP
Data loss prevention. A solution that looks for sensitive data and blocks it before it leaves the network. Firewalls can also help prevent loss.
-
Floor Plans
Overlay the wired and wireless layout. Helps to understand network topology.
-
Physical Network map.
Network Topology
-
Distribution frame
Passive cable termination. Punch down blocks and patch panels.
-
IDF
Intermediate Distribution frame. Sits in between end users and the main distribution frame.
-
Logical Network Map
Network Topology is based on how devices are connected rather than physical locations.
-
Site Survey
Determine existing wireless landscape. Identify existing access points. Work around existing frequencies.
-
Fault tolerance
Maintain uptime in case of failure. Example 2 servers synchronizing or 1 server with RAID and multiple power supplies.
-
High Availability
Example, 1 system that is already running and takes over for the main in case of fault.
-
LBFO
Load balancing fail over. Aggregate bandwidth, redundant parts.
-
NIC Teaming
When network interface cards talk to each other to help with load balancing.
-
Port Aggregation
Having multiple ports on a switch act as one.
-
Multipathing
When a single server has more than one NIC (Network Interface Card) and connects them to their own switch.
-
UPS
Uninterruptible Power Supply. Short term backup power for blackouts, brownouts, and surges.
-
PDU
Power distribution units. Provide multiple power outlets, sometimes built into a rack. Can provide monitoring functions.
-
HVAC
Heating, ventilation, and air conditioning.
-
Fire suppression materials
No water. Use inert gases and chemical agents. Nitrogen, Argon, Helium, Carbon Dioxide.
-
Site Resiliency
Recovery site is prepped in case the primary goes down. Data is synchronized.
-
Cold Site
Empty building with power. You bring the hardware and personnel.
-
Hot Site
A replica of your primary data center.
-
Warm Site
Somewhere in between hot and cold sites.
-
Cloud Site
An established cloud provider.
-
Active – Passive
Two devices installed and configured. Only one is active at a time. The passive one is always in sync.
-
Active – Active
2 devices and both are active at the same time.
-
FHRP
First Hop Redundancy Protocol. A second default gateway is provided if the first one fails.
-
VRRP
Virtual Router Redundancy Protocol. Devices use a virtual IP for the default gateway. If a router disappears another one takes its place.
-
RTO
Recovery Time Objective. Time to get running again.
-
RPO
Recovery Point Objective. How much data loss is acceptable.
-
MTTR
Mean time to repair. Time required to fix the issue.
-
MTBF
Mean time between failures.
-
CIA Triad
Combination of principles for security objectives. Confidentiality, Integrity, and Availability.
-
Confidentiality
Confidentiality prevents disclosure of information to unauthorized individuals or systems. Uses encryption, access controls, steganography to conceal information within another piece of information such as a message within an image.
-
Integrity
Integrity messages can’t be modified without detection. Availability systems must be up and running. Hashing is a fingerprint. Digital signatures use a mathematical scheme to verify the integrity of data. Certificates combine with digital signatures to verify an individual. Non-repudiation provides proof of integrity.
-
Availability
Information is accessible to authorized users. Redundant services. Fault tolerance. Patching closes security holes.
|
|