1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Network Security
Typical ways companies secure networks include switches, wireless access points, routers, firewalls, and security threat management devices.
Network Security Access
Most enterprise network devices are not consumer-grade, lack direct input like keyboards or mice, and require remote access with administrator permissions.
All-in-One Devices
Smaller businesses may use all-in-one devices due to budget or space constraints; these are often called Unified Threat Management (UTM) devices.
UTM Devices
UTM devices combine multiple security functions and are relatively inexpensive compared to dedicated equipment.
Endpoint Management
Server
Security Appliance Features
Common features of all-in-one security appliances include firewalls, intrusion detection, VPN, anti-spam, web/content filtering, anti-spyware, and traffic shaping.
Drawbacks of All-in-One Devices
They can cause performance issues and create a single point of failure, which makes the network more vulnerable to attacks.
Security Planning
Deciding to use an all-in-one device requires careful budget and risk assessment to ensure it meets security needs.
Network Security Summary
The lesson covered dedicated network devices, all-in-one devices, their features, benefits, and potential drawbacks.
Intrusion Detection vs Intrusion Protection
Intrusion detection alerts the administrator but does not block traffic; intrusion protection detects and blocks unrecognized network traffic.
Firewall Function
Monitors and tracks network traffic rather than just being a generic security feature.
Endpoint Management Server Benefits
Reduces IT staffing needs and provides real-time alerts of threats or problems.
Traffic Shaping System
Prioritizes network packets to improve latency and increase available bandwidth.