Fiveable

๐Ÿ”’Cybersecurity for Business Unit 5 Review

QR code for Cybersecurity for Business practice questions

5.1 Network Architecture and Security Design

๐Ÿ”’Cybersecurity for Business
Unit 5 Review

5.1 Network Architecture and Security Design

Written by the Fiveable Content Team โ€ข Last updated September 2025
Written by the Fiveable Content Team โ€ข Last updated September 2025
๐Ÿ”’Cybersecurity for Business
Unit & Topic Study Guides

Network security relies on various components and design principles to protect digital assets. Firewalls, intrusion detection systems, and VPNs form the backbone of secure architectures, working together to monitor, control, and encrypt network traffic.

Best practices like least privilege and defense-in-depth strengthen network security. Segmentation techniques such as VLANs and DMZs further enhance protection by isolating sensitive resources and limiting the scope of potential attacks. These approaches create multiple layers of defense against cyber threats.

Network Architecture Components and Security

Components of secure network architecture

  • Firewalls establish perimeter security by controlling and monitoring incoming and outgoing network traffic based on predefined security policies (packet filtering, stateful inspection)
  • Intrusion Detection Systems (IDS) passively monitor network traffic for suspicious activities and potential threats, generating alerts for further investigation (signature-based, anomaly-based)
    • Intrusion Prevention Systems (IPS) actively block malicious traffic in real-time, preventing potential attacks from reaching their targets (inline deployment, proactive protection)
  • Virtual Private Networks (VPNs) establish secure, encrypted tunnels over untrusted networks, ensuring data confidentiality and integrity for remote access (IPsec, SSL/TLS)
  • Network Access Control (NAC) solutions enforce security policies on devices connecting to the network, ensuring only authorized and compliant devices can access network resources (agent-based, agentless)
  • Security Information and Event Management (SIEM) systems collect, analyze, and correlate security logs and events from various sources, providing real-time monitoring, incident detection, and response capabilities (log aggregation, behavioral analytics)

Security implications of network designs

  • Star topology relies on a central device (switch, hub), making it vulnerable to single points of failure but easier to manage and control security from a central point
  • Bus topology uses a single cable (backbone) to connect devices, where a single cable failure can affect multiple devices and make it difficult to isolate and contain security incidents
  • Ring topology connects devices in a closed loop, where each device acts as a repeater, potentially amplifying network issues and making it challenging to locate the source of security problems
  • Mesh topology provides redundancy and fault tolerance through multiple paths for data transmission, making it harder for attackers to disrupt but more complex to manage and secure

Secure Network Design Principles and Techniques

Best practices for network security

  • Least privilege principle grants users and devices only the minimum access rights necessary to perform their functions, reducing the potential impact of a security breach (role-based access control)
  • Defense-in-depth approach implements multiple layers of security controls (firewalls, IDS/IPS, encryption), ensuring that if one layer fails, others can still protect the network
  • Regular security updates and patch management keep systems and devices up-to-date with the latest security patches, addressing known vulnerabilities and preventing their exploitation (automated patch management)
  • Strong authentication and access control mechanisms, such as multi-factor authentication (MFA) and strong password policies, help prevent unauthorized access to network resources (biometrics, hardware tokens)
  • Encryption of sensitive data using strong encryption algorithms (AES, RSA) protects data in transit and at rest, ensuring confidentiality and integrity of sensitive information

Effectiveness of network segmentation techniques

  • VLANs (Virtual Local Area Networks) logically separate network devices into different broadcast domains, isolating sensitive resources and limiting the scope of potential attacks (traffic isolation, access control)
  • Physical segmentation uses separate physical network infrastructure for different security zones, preventing unauthorized access between segments and reducing the attack surface (air-gapping)
  • Firewall rules and access control lists (ACLs) enforce granular traffic filtering and access control between segments, restricting communication to only necessary protocols and ports (stateful inspection, application-layer filtering)
  • DMZs (Demilitarized Zones) create an intermediate network between the internal network and the internet, placing public-facing servers and services in the DMZ and limiting exposure to internal resources (dual-firewall architecture)
  • Micro-segmentation implements fine-grained security policies at the workload or application level, providing more granular control and limiting lateral movement within the network (software-defined networking, zero-trust architecture)