Devices, Media, and Topology Security
Objectives
This chapter covers the following CompTIA-specified objectives for the Communications Security section of the Security+ exam.
Understand the basic security concepts of network devices.
It is important for you to understand the basic security concepts of network devices, such as firewalls, routers, switches, and so on, so you can protect the environment and outgoing and incoming communications on these devices.
Understand the basic security concepts of storage media devices.
It is important for you to understand the basic security concepts of storage media devices (such as the various types of cable and removable media) so you can protect the environment and outgoing and incoming communications on these devices.
Understand the basic security concepts of security topologies.
It is important for you to understand the basic concepts of security topologies (such as security zones, VLANs, NAT, and tunneling) so you can protect the environment and outgoing and incoming communications.
Outline
Introduction
Understanding the Basic Security Concepts of Network and System Devices
- Firewalls
- Packet-Filtering Firewall
- Circuit-Level Gateway
- Application-Level Gateway
- Stateful Inspection Firewall
- Other Firewall Considerations
- Routers
- Switches
- Wireless and Mobile Communications
- Modems
- RAS
- Telecommunications/PBX
- IDS
- Network Monitoring/Diagnostic
- Fault Management
- Configuration Management
- Accounting Management
- Performance Management
- Security Management
- Simple Network Management Protocol
- RMON
- Workstations
- Servers
Understanding the Basic Security Concepts of Media
- Coaxial Cable
- UTP/STP
- Fiber
- Infrared, RF, and Microwave
- Removable Media
- Tape
- CDR
- Hard Drives and Disks
- Flashcards and Nonvolatile Memory
- Smart Cards
Understanding the Concepts of Security Topologies
- Security Zones
- Bastion Host
- Screened Host Gateway
- Screened Subnet Gateway
- DMZs
- Intranets
- Extranets
- Virtual Local Area Networks
- Network Address Translation
- Tunneling
Chapter Summary
Apply Your Knowledge
Study Strategies
One of the most important topics of this chapter is security topology and firewalls, which are security controls designed specifically to protect the infrastructure. Be sure you understand the types of firewalls and security topology configurations.
If you have access to a Cisco router, Unix machine, or Windows 2000 machine (better yet, all three), make sure you are familiar with features such as access lists and IP filtering.
Set up one or more of the security topologies in your lab.
Introduction
This chapter takes you through the basics of media, devices, and security topology. Protecting communications includes more than securing the software technologies and protocols covered in Chapter 2, "Communication Security." The infrastructure, including all network devices, servers, and data, also requires security controls on all levels to ensure company-wide network security.