Ch05 - Securing the Network Infrastructure

Ch05 - Securing the Network Infrastructure - Securing the...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Securing the Network I nfrastructure Security+ Guide to Network Security Fundamentals Second Edition Chapter 5:
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Objectives Work with the network cable plant Secure removable media Harden network devices Design network topologies
Background image of page 2
3 Working with the Network Cable Plant Cable plant: physical infrastructure of a network (wire, connectors, and cables) used to carry data communication signals between equipment Three types of transmission media: Coaxial cables Twisted-pair cables Fiber-optic cables
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Coaxial Cables Coaxial cable was main type of copper cabling used in computer networks for many years Has a single copper wire at its center surrounded by insulation and shielding Called “coaxial” because it houses two (co) axes or shafts the copper wire and the shielding Thick coaxial cable has a copper wire in center surrounded by a thick layer of insulation that is covered with braided metal shielding
Background image of page 4
5 Coaxial Cables (continued) Thin coaxial cable looks similar to the cable that carries a cable TV signal A braided copper mesh channel surrounds the insulation and everything is covered by an outer shield of insulation for the cable itself The copper mesh channel protects the core from interference BNC connectors: connectors used on the ends of a thin coaxial cable
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Coaxial Cables (continued)
Background image of page 6
7 Twisted-Pair Cables Standard for copper cabling used in computer networks today, replacing thin coaxial cable Composed of two insulated copper wires twisted around each other and bundled together with other pairs in a jacket Shielded twisted-pair (STP) cables have a foil shielding on the inside of the jacket to reduce interference Unshielded twisted-pair (UTP) cables do not have any shielding Twisted-pair cables have RJ-45 connectors
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Fiber-Optic Cables Coaxial and twisted-pair cables have copper wire at the center that conducts an electrical signal Fiber-optic cable uses a very thin cylinder of glass (core) at its center instead of copper that transmit light impulses A glass tube (cladding) surrounds the core The core and cladding are protected by a jacket
Background image of page 8
9 Fiber-Optic Cables (continued) Classified by the diameter of the core and the diameter of the cladding Diameters are measured in microns, each is about 1/25,000 of an inch or one-millionth of a meter Two types: Single-mode fiber cables: used when data must be transmitted over long distances Multimode cable: supports many simultaneous light transmissions, generated by light-emitting diodes
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Securing the Cable Plant Securing cabling outside the protected network is not the primary security issue for most organizations Focus is on protecting access to the cable plant in the internal network An attacker who can access the internal network directly through the cable plant has effectively bypassed the network security perimeter and can launch his attacks at will
Background image of page 10
11 Securing the Cable Plant (continued)
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 52

Ch05 - Securing the Network Infrastructure - Securing the...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online