Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 7 - Coggle Diagram
CHAPTER 7
-
Network Security Posture
-
Not all applications are designed and written with security and reliability in mind, so falls to network to provide protection
Network-delivered services can scale better for larger environments and can complement server and application functionality
Attacker who can successfully penetrate computer network may have access to thousands of desktop systems, servers, and storage devices
Standard Network Devices
- Security functions of standard network devices can be used to provide degree of network security
2.Network devices can be classified based on function in Open systems interconnection (OSI) model
Standards released in 1978, revised in 1983, still used today
-
-
-
OSI Layer
OSI model breaks networking steps into seven layers
1.Each layer has different networking tasks
2.Each layer cooperates with adjacent layers
Hubs
1.Used by early LANs to connect multiple Ethernet devices together to function as single network segment
2.Did not read data passing through them so ignorant of data source and destination
3.Hubs rarely used today due to security vulnerability and increased network traffic
Switches
- Device that connects network devices
Operate at Data Link Layer (Layer 2)
2.Determine which device is connected to each port
3.Provide better security than hubs by limiting distribution of frames
Traffic Monitoring
- Network administrator monitors network traffic to help identify and troubleshoot network problems
2.Traffic Monitoring method
:check:Port-Mirroring
:check:Network Tap
-
Load Balancing
1.Technology to help evenly distribute work across network
2.Allocate requests among multiple devices
3.Load balancing achieved through software or hardware device