Best-practice-for-network-segmentation Logo

Best-practice-for-network-segmentation

0
Free
Visit Website

Best practices for segmentation of the corporate network of any company. Graphic diagrams are available in the Release page. The schema sources are located in the repository. Elements used in network diagrams: Crossing the border of the rectangle means crossing the firewall. Level 1 of network segmentation: basic segmentation. Advantages: Basic segmentation to protect against basic targeted attacks that make it difficult for an attacker to advance on the network. Basic isolation of the productive environment from the corporate one. Disadvantages: The default corporate network should be considered potentially compromised. Potentially compromised workstations of ordinary workers, as well as workstations of administrators, have basic and administrative access to the production network. In this regard, the compromise of any workstation can theoretically lead to the exploitation of the following attack vector. An attacker compromises a workstation in the corporate network. Further, the attacker can move laterally within the network, potentially accessing sensitive data and systems.

FEATURES

ALTERNATIVES

Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.

A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota.

Frontpage of the IO wargame with various versions and connection details.

A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.

A comprehensive guide to SSL/TLS vulnerabilities and vulnerable cipher suites.

A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.

A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.

A docker container with multiple vulnerable applications for cybersecurity training.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved