Тёмный

Understanding Cybersecurity: Network Segmentation 

Intelligence Quest
Подписаться 2,6 тыс.
Просмотров 41 тыс.
50% 1

In this video Travis discusses why network segmentation is used as well as some common practices for segmenting networks. He uses the example of a small to medium office environment where it would be good security practice to segment IOT devices. He presents the concept of VLANs as well as routing between segmented networks and why network segmentation makes this more difficult.
► Stay in touch!
Follow: / travisiq
Website: intelligencequest.com/
Instagram: / travis_iq
Linkedin: / traviswentworthiq

Наука

Опубликовано:

 

5 окт 2020

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 37   
@MrUnisteez
@MrUnisteez 2 года назад
Thanks! This was a simple explanation that gave me just enough information to answer a lot of the questions I had about network segmentation using VLANs.
@Dalai33
@Dalai33 5 месяцев назад
One of the very most underrated channels here! Oh my God thank you very very much
@intelligencequest
@intelligencequest 5 месяцев назад
Thanks so much for the kind words!
@jackdavies7337
@jackdavies7337 3 года назад
So helpful thank you.
@theancientvoice9272
@theancientvoice9272 5 месяцев назад
Great content, thank you!
@lasagna3084
@lasagna3084 Год назад
Super helpful!
@techenthusiast4542
@techenthusiast4542 Год назад
Good info brother!
@omarinv7863
@omarinv7863 2 года назад
Great video thank u so much
@31qwoz
@31qwoz 3 года назад
Great information
@techlife4599
@techlife4599 2 года назад
In Mr. Burns voice....EXXCEELLENT... Great video. I'm a suscriber & sharing 👍
@intelligencequest
@intelligencequest 2 года назад
Thank you! Let's goooo!
@Allexz
@Allexz 3 года назад
You deserve more subs!
@intelligencequest
@intelligencequest 3 года назад
Thanks a lot! I appreciate the encouragement
@leaftro
@leaftro 3 года назад
Word of Truth!
@intelligencequest
@intelligencequest 3 года назад
@@leaftro thanks the feedback is much appreciated!
@loganborowski
@loganborowski 3 года назад
Great content thank you.
@intelligencequest
@intelligencequest 3 года назад
Thanks! Next up is access control lists!! Should have it out tomorrow!
@daizy8888
@daizy8888 10 месяцев назад
This is great video! would you mind clarifying the use of VRF in a segmented network?
@intelligencequest
@intelligencequest 9 месяцев назад
Absolutely! so in the video above I was addressing L2 segmentation, VRF would effectively allow for segmentation of traffic as it was being routed --> think two sets of clients being routed by the same piece of hardware, but for security, logging, analytics you want each of the client networks have their own routing instances, you can utilize Virtual Routing and Forwarding (VRF) to route this traffic but maintain separation of traffic and routing tables
@StuckInTheM1ddle
@StuckInTheM1ddle 2 года назад
Appreciate this for for an office environment but just for anyone (like myself) looking for ways to segregate a home network, having a L2 Switch (VLAN capable) is not enough for looking to implement VLAN in this way - you need a router that supports VLAN's and nearly all consumer-level routers don't support this.
@intelligencequest
@intelligencequest 2 года назад
I would look into Ubiquiti, they offer some great consumer grade products that I have installed in a number of homes. Their equipment is great for network segmentation implementations
@clovisvigneault
@clovisvigneault 3 месяца назад
You can always find a consumer router that can be flashed to openwrt or ddwrt to unlock these « enterprise » feature, they have lists of compatible routers with their specs
@wendy_113
@wendy_113 9 месяцев назад
"Thank you very much!"
@rozye3004
@rozye3004 Год назад
You are super cute ! The Humor makes it enjoyable to watch ❤
@amigatommy7
@amigatommy7 Год назад
Thinking of 2 10gbe switches with Asus 89x router which has 2 10gbe ports. Not sure both can be used at the same time.
@intelligencequest
@intelligencequest Год назад
TBH I'm not sure either tom
@techenthusiast4542
@techenthusiast4542 Год назад
What gear do you use to draw? (hardware and software) Wacom?
@intelligencequest
@intelligencequest Год назад
Yes wacom intuous tablet and pen
@techenthusiast4542
@techenthusiast4542 Год назад
@@intelligencequest I just started using it and long ways to go to make it look natural. Right now I struggle in meetings with new work from home situation. Was so used to whiteboard and markers 🤣
@intelligencequest
@intelligencequest Год назад
@@techenthusiast4542 100%.. it just takes time.. but I still don't think there is any replacing in person white boarding.. I think a mix of virtual and live has to be what we use going forward 👍
@macster1457
@macster1457 2 года назад
Can I still do with if I want to segregate my wireless security cameras? - am I going to need 2 wireless routers then?
@intelligencequest
@intelligencequest 2 года назад
There are a couple of things that you can do, but the most common is to make a second SSID aka IOTnetwork with its own password and IP address range and segment that network from your primary wireless network. By segment I mean either add ACL entries if you want to allow certain traffic or deny all traffic from that IOT network to the rest of your network (the implementation of this will be different on different Network Operating Systems - NOS')
@macster1457
@macster1457 2 года назад
@@intelligencequest yes... the other thing I need to accomplish is to completely isolate the wireless cameras from the main router. I need to figure out a way to have a 2nd router just for the cameras so the main router has nothing to do with them.
@MorgorDre
@MorgorDre Год назад
So whats the actual threat prevented?
@intelligencequest
@intelligencequest Год назад
So the "threat" in this case is that any one of the device on your network is compromised. If this occurs and your network is segmented the likelihood of your entire network being compromised is significantly lower. To give you a specific threat example, you could have your file storage server compromised (in a small/medium environment this might be a single device like a Synology NAS). Even more specifically, an attacker leverages vulnerabilities in the file sharing protocol SMB to upload and run software establishing persistence on this file server. If your network is segmented appropriately the attacker will NOT have the ability to pivot to all the other devices in the network. If your network is not segmented, all of the other devices are now potentially victims as well.
@tamashalmai8224
@tamashalmai8224 3 года назад
The security concepts such as L2 segmentation, FW, ACL, router on a stick etc. are all fine. However, my impression is that you try to cover too much in this vlog and give the wrong impression to an especially novice user that these basic security techniques are the holly grails that will cure all security concerns. Therefore I would rather start with a top-down analysis, highlight potential attack vectors and demonstrate which technique would be suitable to mitigate what concern. I.e. what you mention few times in your vlog as defense-in-depth
@intelligencequest
@intelligencequest 3 года назад
Thank you for the feedback! I actually agree to some extent and I think we are trying to fill in the gaps in this content with subsequent videos.. in response to the "cure all nature" of this segmentation video... that certainly was not the intent! How ever we do think segmentation is an area of basic networking that is very under utilized is most small and medium networks.
Далее
Cybersecurity Architecture: Networks
27:31
Просмотров 98 тыс.
How the hell is this done#joker #shorts
00:14
Просмотров 2,4 млн
Stray Kids <ATE> UNVEIL : TRACK "MOUNTAINS"
00:59
Subnet Mask - Explained
17:55
Просмотров 2,7 млн
DMZ Explained | Demilitarised Zone
6:11
Просмотров 32 тыс.
Microsegmentation Overview
16:38
Просмотров 5 тыс.
Will the battery emit smoke if it rotates rapidly?
0:11
Самый СТРАННЫЙ смартфон!
0:57
Просмотров 35 тыс.
YOTAPHONE 2 - СПУСТЯ 10 ЛЕТ
15:13
Просмотров 123 тыс.