Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [92]

By Root 3036 0
for removable media, and they have replaced diskettes and other storage in many settings.

Being nothing more than storage media, thumb drives are susceptible to holding the same malware as other forms of removable media.

Summary


In this chapter, I covered the key elements of the network infrastructure and the various components involved in networking. Your infrastructure is the backbone and key to all the security capabilities of your network.

Your infrastructure includes the hardware and software necessary to run your network. The key elements used in security are routers and firewalls. Proper configuration is the key to providing services the way your network needs them. If your network security devices are improperly configured, you may be worse off than if you didn’t have them at all. It’s a dangerous situation when you think you’re secure but in actuality you aren’t.

Networks are becoming more complicated, and they’re being linked to other networks at an accelerated speed. Several tools are available to help you both link and secure your networks:

■ VPNs

■ Tunneling protocols

■ Remote access

The connections you make using TCP/IP are based primarily on IP addresses. When coupled with a port, these addresses form a socket. Sockets are the primary method used to communicate with services and applications such as the Web and Telnet. Most services have standard sockets that operate by default. Sockets are changeable for special configurations and additional security. Changing default ports requires that users know which ports provide which services.

Network monitors are primarily troubleshooting tools, and they can be used to eavesdrop on networks. Intrusion detection systems take an active role and can control traffic and systems. IDSs use extensive rule-based procedures to check audit files and network traffic, and they can make decisions based upon those rules. In conjunction with a firewall, an IDS can offer high levels of security.

The communication media you use will determine the security of communication from the physical perspective. Several different types of media are available for networks, including:

■ Coax

■ UTP/STP

■ Fiber optic

■ Infrared

■ RF

■ Microwave

Each provides a unique challenge that requires attention to ensure that security requirements are met.

Removable media can be a carrier or storage vessel for viruses. Make sure it is scanned with antivirus software to verify that it remains clean. Removable media is also easily transported and can disappear. Physical security measures are important to prevent this from happening.

Exam Essentials


Be able to describe the various components and the purpose of an infrastructure. Your network’s infrastructure is the backbone of your systems and network operations. The infrastructure includes all the hardware, software, physical security, and operational security methods in place. The key components of your infrastructure include devices such as routers, firewalls, switches, modems, telecommunications systems, and the other devices used in the network.

Know the characteristics of the connectivity technologies available to you and the security capabilities associated with each. Remote access, PPP, tunneling protocols, and VPNs are your primary tools. PPTP and L2TP are two of the most common protocols used for tunneling. IPSec, although not a tunneling protocol, provides encryption to tunneling protocols; it’s often used to enhance tunnel security.

Familiarize yourself with the technologies used by TCP/IP and the Internet. IP addresses and port numbers are combined to create an interface called a socket. Most TCP and UDP protocols communicate using this socket as the primary interface mechanism. Clients and servers communicate using ports. Ports can be changed to enhance security. Web services use HTML and other technologies to allow rich and animated websites. These technologies potentially create security problems because they may have individual vulnerabilities. Verify the problems that exist from a security perspective

Return Main Page Previous Page Next Page

®Online Book Reader