1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The defense of the underlying networking infrastructure against theft, abuse, and illegal access is known as network security. It entails building a secure infrastructure so that users, apps, devices, and applications can all operate
safely.
NETWORK SECURITY
designed to prevent unauthorized personnel from gaining physical access to network components
PHYSICAL
protect data that is stored on the network or which is in transit across, into or
out of the network.
TECHNICAL
consist of security policies and processes that control user behavior
ADMINISTRATIVE
is the foundation of effective security,
using encryption, authentication, and data integrity to protect
data and communications.
Cryptography
ensures that only intended recipients can read the data,
Encryption
checks detect any tampering during transmission.
authentication and integrity
helps verify identities and securely create symmetric session keys, which are then used to authenticate and decrypt data during secure sessions.
Public key cryptography
Cryptographic security can be applied either to the entire data
path or just parts of it, depending on security needs. __________ offers the highest protection, but securing only untrusted segments (like the Internet) may be
sufficient in some cases. z/OS provides flexible security protocols to protect either partial or full data paths.
END TO END SECURITY
In making a security protocol selection, an important
consideration is the application workload to be protected. In
order to illustrate this concept, it is helpful to understand where
various protocols are implemented from a protocol layering
perspective.
WORKLOAD-BASED SECURITY
is a network security device that controls traffic based on
security rules, and Cisco provides both threat-focused and unified threat
management (UTM) firewall solutions.
Firewall
actively blocks attacks by analyzing network traffic and using global threat intelligence to detect, stop, and track malicious activity and malware across the network.
intrusion prevention system (IPS)
protects distributed workloads across cloud and
hybrid environments by securing their larger attack surfaces without
compromising business agility.
Workload security
is a cloud-native platform that integrates the Cisco Secure
portfolio with your infrastructure to significantly reduce dwell time and
manual tasks.
SecureX
software-defined segmentation classifies network traffic based on endpoint identity, enabling easier enforcement of security policies by assigning access rights based on roles, locations, and other factors while isolating suspicious devices.
Network Segmentation
encrypts the connection between an
endpoint and a network, typically using IPsec or SSL to authenticate remote-
access communications over the internet.
virtual private network (VPN)
identifies users and devices to enforce
security policies, blocking or limiting access for noncompliant endpoints to
protect the network.
Network access control (NAC)
malware, including viruses, worms,
Trojans, ransomware, and spyware, can remain dormant after infection, so
advanced antimalware programs continuously monitor files to detect
anomalies, remove threats, and repair damage.
Anti-virus and anti-malware software
involves protecting the hardware, software, and
processes used to safeguard business applications from vulnerabilities that
attackers could exploit to infiltrate the network.
Application security
Behavioral analytics tools detect abnormal network
activity by identifying deviations from normal behavior, helping security teams
spot indicators of compromise and quickly address potential threats.
Behavioral Analytics
encompasses technologies, policies, and applications that
protect online IP, services, and data, helping secure user access and safeguard data and applications in the cloud.
Cloud security
technologies help organizations prevent staff
from sending sensitive information outside the network by blocking unsafe
actions like uploading, forwarding, or printing critical data.
Data loss prevention (DLP)
email gateways are a major threat vector for security
breaches, with attackers using phishing tactics to deliver malware, and email
security applications block incoming threats and control outbound messages
to protect sensitive data.
Email Security
wireless networks are less secure than wired ones, and
without proper security measures, a wireless LAN can be as vulnerable as
exposed Ethernet ports; specialized products are needed to protect the
network from exploitation.
Wireless Security