<s>
Network	B-Architecture
segmentation	I-Architecture
in	O
computer	B-Architecture
networking	I-Architecture
is	O
the	O
act	O
or	O
practice	O
of	O
splitting	O
a	O
computer	B-Architecture
network	I-Architecture
into	O
subnetworks	B-Protocol
,	O
each	O
being	O
a	O
network	B-Protocol
segment	I-Protocol
.	O
</s>
<s>
There	O
is	O
a	O
reduced	O
attack	O
surface	O
available	O
to	O
pivot	O
in	O
if	O
one	O
of	O
the	O
hosts	O
on	O
the	O
network	B-Protocol
segment	I-Protocol
is	O
compromised	O
.	O
</s>
<s>
Common	O
attack	O
vectors	O
such	O
as	O
LLMNR	O
and	O
NetBIOS	B-Protocol
poisoning	O
can	O
be	O
partially	O
alleviated	O
by	O
proper	O
network	B-Architecture
segmentation	I-Architecture
as	O
they	O
only	O
work	O
on	O
the	O
local	O
network	O
.	O
</s>
<s>
Finance	O
and	O
Human	O
Resources	O
typically	O
need	O
access	O
via	O
their	O
own	O
VLAN	B-General_Concept
to	O
their	O
application	O
servers	O
because	O
of	O
the	O
confidential	O
nature	O
of	O
the	O
information	O
they	O
process	O
and	O
store	O
.	O
</s>
<s>
Segregation	O
is	O
typically	O
achieved	O
by	O
a	O
combination	O
of	O
firewalls	B-Application
and	O
VLANs	B-General_Concept
(	O
Virtual	B-General_Concept
Local	I-General_Concept
Area	I-General_Concept
Networks	I-General_Concept
)	O
.	O
</s>
