chapter_15 - Todd Lammles CompTIA Network+ Chapter 15:...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style Todd Lammle’s CompTIA Network+ Chapter 15: Physical and Hardware Security Instructor:
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 15 Objectives The Following CompTIA Network+ Exam Objectives Are Covered in This Chapter: 6.1 Explain functions of hardware and software security Network based firewall / Host based firewall IDS, IPS VPN concentrator 6.2 Explain common features of a firewall Application layer vs. network layer Stateful vs. stateless Scanning services, Content filtering, Signature identification Zones 6.5 Explain issues that affect device security Physical security Restricting local and remote access Secure methods vs. unsecure methods SSH, HTTPS, SNMPv3, SFTP, SCP TELNET, HTTP, FTP, RSH, RCP, SNMPv1/2 2
Background image of page 2
Using Hardware and Software Security Devices 3 In medium to large enterprise networks, strategies for security usually include some combination of internal and perimeter routers plus firewall devices. Internal routers provide added security by screening traffic to the more vulnerable parts of a corporate network though a wide array of strategic access lists .
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Firewalls 4 Firewalls are usually a combination of hardware and software. The hardware part is usually a router, but it can also be computer or a dedicated piece of hardware called a black box that has two Network Interface Cards (NICs) in it. One of the NICs connects to the public side, and the other one connects to the private side. The software part is configured to control how the firewall actually works to protect your network by scrutinizing each incoming and outgoing packet and rejecting any suspicious ones.
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 24

chapter_15 - Todd Lammles CompTIA Network+ Chapter 15:...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online