Summary

In this chapter, we covered the key elements of the infrastructure and the various components involved in networking. Your infrastructure is the backbone and key to the entire security capabilities of your network.

Infrastructure includes the hardware and software necessary to run your network. The key elements used in security are routers and firewalls. Proper configuration is the key to providing services the way your network needs them. If your network security devices are improperly configured, you may be worse off than if you did not have them at all. It is a dangerous situation when you think you are secure, when in actuality you are not.

Networks are becoming more complicated, and they are being linked to other networks at an accelerating speed. Several tools are available to help you both link and secure your networks. These tools include:

  • VPNs

  • Tunneling protocols

  • Remote access

The connections you make using TCP/IP are based primarily on IP addresses. When coupled with a port, these addresses form a socket. Sockets are the primary method used to communicate with services and applications such as WWW and Telnet. Most services have standard sockets that operate by default. Sockets are changeable for special configurations and additional security. Changing default ports requires that users know which ports provide which services.

Network monitors are primarily troubleshooting tools, and they can be used to eavesdrop on networks. Intrusion Detection Systems take an active role and can control traffic and systems. IDS uses extensive rules-based procedures to check audit files and network traffic. They can make decisions based upon those rules. In conjunction with a firewall, IDS can offer very high levels of security.

The communication media used determines the security of the communications from a physical perspective. Several different types of media are available for networks, including:

  • Coax

  • UTP/STP

  • Fiber

  • Infrared

  • RF

  • Microwave

Each of these media provides a unique challenge that requires attention to ensure that security requirements are met.

Removable media can be a carrier or storage vessel for viruses. Make sure they are scanned with antivirus software to verify that they remain clean. Removable media are also easily transportable, and they can disappear rather easily. Physical security measures are important to prevent this from happening.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net