9781111640125_IM_ch07

Security+ Guide to Network Security Fundamentals

  • Notes
  • 9
  • 100% (1) 1 out of 1 people found this document helpful

This preview shows page 6 - 9 out of 9 pages.

IP Telephony 1. Explain that IP telephony offers significant enhancements over traditional telephone systems. 2. Discuss the benefit that IP telephony offers to an organization, including: a. Cost savings b. Management c. Application development d. Infrastructure requirements e. Reduced regulatory requirements f. Increased user productivity 3. Use Table 7-7 to illustrate the vulnerabilities of IP telephony.
Image of page 6

Subscribe to view the full document.

Security+ Guide to Network Security Fundamentals, Fourth Edition 7-7 Cloud Computing 1. Explain that cloud computing, which is a pay-per-use computing model in which customers pay only for the computing resources they need, is emerging as a potentially revolutionary concept that can dramatically impact all areas of IT, including network design, applications, procedures, and even personnel. 2. Note that cloud computing holds the potential of changing the face of IT to the extent that the history of computing may be distinguished as “pre-cloud” and “post-cloud.” 3. Discuss the three service models in cloud computing: a. Cloud Software as a Service (SaaS) b. Cloud Platform as a Service (PaaS) c. Could Infrastructure as a Service (IaaS) Quick Quiz 2 1. ____ may be defined as the authoritative and prescribed direction for conduct. Answer: Procedural rules 2. True or False: A derailment of service (DoS) attempts to prevent a system from performing its normal functions through a deliberate attempt to prevent authorized users from access to the system. Answer: False 3. A(n) ____ is a record of events that occur. Logs related to computer security have become particularly important. Answer: log 4. ____ is a means of managing and presenting computer resources by function without regard to their physical layout or location. Answer: Virtualization Class Discussion Topics 1. Have students discuss possible strategies for using “as a service” services in an IT organization. 2. Have students discuss possible virtualization strategies and advantages. Teaching Tip Explain that many organizations have already outsourced their security teams to managed service providers.
Image of page 7
Security+ Guide to Network Security Fundamentals, Fourth Edition 7-8 Additional Projects 1. Have students research the licensing models for various server and client operating systems in the virtual environment. 2. Have students research virtual network technologies, such as MPLS. Additional Resources 1. 802.1x 2. What is 802.1x? 3. DNSSEC 4. X.509 – RFC 2459 5. Generating X.509 Certificates Key Terms cloud computing A pay-per-use computing model in which customers pay only for the computing resources that they need, and the resources can be easily scaled.
Image of page 8

Subscribe to view the full document.

Image of page 9
You've reached the end of this preview.
  • '
  • NoProfessor
  • Transmission Control Protocol, File Transfer Protocol, Network Security Fundamentals, Security+ Guide

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern