CompTIA Network+ Certification Study Guide part 41

CompTIA’s Network+ certification Study Guide part 41 is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. The 2009 Network+ exam (N10-004) is a major update with more focus on security and wireless aspects of networking. Our new study guide has been updated accordingly with focus on network, systems, and WAN security and complete coverage of today’s wireless networking standards. | 386 CHAPTER 9 Security Standards and Services This chapter also covers intrusion detection. It is important to understand not only the concepts of intrusion detection but also the use and placement of intrusion detection systems IDSs within a network infrastructure. The placement of an IDS is critical to deployment success. We also cover intrusion prevention systems IPSs honeypots honeynets and incident response and how they each have a part to play in protecting your network environment. HARDWARE AND SOFTWARE SECURITY DEVICES Not all networks are created the same thus not all networks should be physically laid out in the same fashion. The judicious usage of differing security topologies in a network can offer enhanced protection and performance. We discuss the components of a network and the security implications of each. By understanding the fundamentals of each component and being able to design a network with security considerations in mind you will be able to better prepare yourself and your environment for the inevitable barrage of attacks that take place every day. With the right planning and design you will be able to minimize the impact of attacks while successfully protecting important data. Many tools exist today that can help you better manage and secure your network environment. We focus on a few specific tools that give you the visibility you need to keep your network secure . intrusion detection and protection firewalls honeypots content filters and protocol analyzers. These tools will allow you to monitor detect and contain malicious activity in your environment. Each of these tools plays a different part in the day-to-day routine of a network administrator but all of them assist you to be well armed and well prepared to handle what malicious attacks might come your way. Intrusion Detection and Preventions Systems A successful security strategy requires many layers and components. Because firewalls and other simple boundary devices lack some .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.