Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Security+ guide to network security fundamentals fourth edition answers

03/12/2021 Client: muhammad11 Deadline: 2 Day

Security+ Guide to Network Security Fundamentals, Fourth Edition

Chapter 6

Network Security

1

Security Through Network Devices

Not all applications designed, written with security in mind

Network must provide protection

Networks with weak security invite attackers

Aspects of building a secure network

Network devices

Network technologies

Design of the network itself

Security+ Guide to Network Security Fundamentals, Fourth Edition

2

2

Standard Network Devices

Security features found in network hardware

Provide basic level of security

Open Systems Interconnection (OSI) model

Network devices classified based on function

Standards released in 1978, revised in 1983, still used today

Illustrates:

How network device prepares data for delivery

How data is handled once received

Security+ Guide to Network Security Fundamentals, Fourth Edition

3

3

4

Table 6-1 OSI reference model

Using the seven layers of the OSI model, we can explore more fully how data can be transferred between two networked computers

4

Standard Network Devices

Hubs

Connect multiple Ethernet devices together:

To function as a single network segment

Ignorant of data source and destination

Rarely used today because of inherent security vulnerability

5

Switches

Can forward frames sent to that specific device or broadcast to all devices

Use MAC address to identify devices

Provide better security than hubs

5

Security+ Guide to Network Security Fundamentals, Fourth Edition

6

Figure 6-1 Port mirroring

© Cengage Learning 2012

6

Standard Network Devices (cont’d.)

Network administrator should be able to monitor network traffic

Helps identify and troubleshoot network problems

Traffic monitoring methods

Port mirroring

Network tap (test access point)

Sniffer Software

Security+ Guide to Network Security Fundamentals, Fourth Edition

7

7

8

Sniffer Software

Switch Defenses

Use a switch that can close ports with too many MAC addresses

Configure the switch so that only one port can be assigned per MAC address

Use an ARP detection appliance

Secure the switch in a locked room

Keep network connections secure by restricting physical access

8

Standard Network Devices

Load balancers

Help evenly distribute work across a network

Allocate requests among multiple devices

Ex: port 80 for web HTTP

Laymance Apache Load Balancers

9

9

Load Balancing Security

Security advantages of load balancing

Can stop attacks directed at a server or application

Can detect and prevent denial-of-service attacks

Some can deny attackers information about the network

Hide HTTP error pages

Remove server identification headers from HTTP responses

Security+ Guide to Network Security Fundamentals, Fourth Edition

10

10

Removing Headers for Server Security

Typically we have 3 response headers which many people want to remove for security reason.

Server - Specifies web server version.

X-Powered-By - Indicates that the website is "powered by ASP.NET."

X-AspNet-Version - Specifies the version of ASP.NET used.

msdn blogs

Security+ Guide to Network Security Fundamentals, Fourth Edition

11

11

Security+ Guide to Network Security Fundamentals, Fourth Edition

12

Hardware-based network firewall inspects packets

Looks deeply into packets that carry HTTP traffic

Web browsers, FTP

Can block specific sites or specific known attacks

Can block XSS and SQL injection attacks

Firewalls

12

Security+ Guide to Network Security Fundamentals, Fourth Edition

13

Proxy Servers and Reverse Proxy

Computer or application that intercepts and processes user requests

Reverse proxy

Routes incoming requests to correct server

Reverse proxy’s IP address is visible to outside users

Internal server’s IP address hidden

Stronger security

Intercept malware

Hide client system’s IP address

13

Security+ Guide to Network Security Fundamentals, Fourth Edition

14

Figure 6-5 Configuring access to proxy servers

© Cengage Learning 2012

14

Security+ Guide to Network Security Fundamentals, Fourth Edition

15

Figure 6-6 Reverse proxy

© Cengage Learning 2012

Reverse Proxy Server

I am now the user

15

Network Security Hardware (cont’d.)

Spam filters

Enterprise-wide spam filters block spam before it reaches the host

Email systems use three protocols

Simple Mail Transfer Protocol (SMTP)

Handles outgoing mail

Post Office Protocol (POP)

Handles incoming mail

Internet Message Access Protocol (IMAP)

Handles reading email from many different devices

Security+ Guide to Network Security Fundamentals, Fourth Edition

16

16

Network Security Hardware (cont’d.)

Security+ Guide to Network Security Fundamentals, Fourth Edition

Spam filters installed with the SMTP server

Filter configured to listen on port 25

Pass non-spam e-mail to SMTP server listening on another port

Method prevents SMTP server from notifying spammer of failed message delivery

Roll MS Outlook Junk Email Filter

17

17

Network Security Hardware (cont’d.)

Virtual private network (VPN)

Uses unsecured network as if it were secure

All data transmitted between remote device and network is encrypted

Hardware-based generally have better security

Software-based have more flexibility in managing network traffic

Security+ Guide to Network Security Fundamentals, Fourth Edition

18

18

Network Security Hardware (cont’d.)

Internet content filters

Monitor Internet traffic

Block access to preselected Web sites and files

Unapproved sites identified by URL or matching keywords

19

19

Network Security Hardware (cont’d.)

Security+ Guide to Network Security Fundamentals, Fourth Edition

20

Web security gateways

Can block malicious content in real time

Block content through application level filtering

Examples of blocked Web traffic

ActiveX objects, Adware, spyware, Peer to peer file sharing, Script exploits

20

Network Security Hardware (cont’d.)

Network intrusion detection system (NIDS)

Watches for attacks on the network

NIDS sensors installed on firewalls and routers:

Gather information and report back to central device

Passive NIDS will sound an alarm

Active NIDS will sound alarm and take action

Actions may include filtering out intruder’s IP address or terminating TCP session

Security+ Guide to Network Security Fundamentals, Fourth Edition

21

21

Network Security Hardware (cont’d.)

Network intrusion prevention system (NIPS)

Similar to active NIDS

Monitors network traffic to immediately block a malicious attack

22

22

Demilitarized Zone (DMZ)

Demilitarized Zone (DMZ)

Separate network located outside secure network perimeter

Untrusted outside users can access DMZ but not secure network

Security+ Guide to Network Security Fundamentals, Fourth Edition

23

23

Security+ Guide to Network Security Fundamentals, Fourth Edition

24

Figure 6-11 DMZ with one firewall

© Cengage Learning 2012

24

Subnetting

IP address may be split anywhere within its 32 bits

Network can be divided into three parts

Network

Subnet

Host

Each network can contain several subnets

Each subnet can contain multiple hosts

Security+ Guide to Network Security Fundamentals, Fourth Edition

Improves network security by isolating groups of hosts

Allows administrators to hide internal network layout

25

www.ccnapractice.org

26

26

Virtual LANs (VLAN)

Allow scattered users to be logically grouped together:

Even if attached to different switches

Can isolate sensitive data to VLAN members

Communication on a VLAN

If connected to same switch, switch handles packet transfer

Special “tagging” protocol used for communicating between switches\

Use for internal and telecommuters

Wrap up video roll!

https://www.youtube.com/watch?v=2hUUaG4o3DA

Security+ Guide to Network Security Fundamentals, Fourth Edition

27

27

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Assignment Solver
Exam Attempter
Online Assignment Help
Finance Homework Help
Top Academic Tutor
Top Rated Expert
Writer Writer Name Offer Chat
Assignment Solver

ONLINE

Assignment Solver

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$34 Chat With Writer
Exam Attempter

ONLINE

Exam Attempter

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$28 Chat With Writer
Online Assignment Help

ONLINE

Online Assignment Help

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$15 Chat With Writer
Finance Homework Help

ONLINE

Finance Homework Help

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$17 Chat With Writer
Top Academic Tutor

ONLINE

Top Academic Tutor

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$45 Chat With Writer
Top Rated Expert

ONLINE

Top Rated Expert

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$43 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Order 2055954: Read Instructions - Planning involves all of the following except - Elk grove unified school district v newdow case - Statistics - Phy2042 body systems physiology - Social media marketing plan assignment - BU204 Discussion Unit 2 - How to calculate reading rate - Ctrl z vs ctrl c - Victoria's basement wine decanter - Schroder equity opportunities fund - 8 step model for ethical decision making - Discussion question #1 - A cross flow heat exchanger used in a cardiopulmonary - Construction 3,000 word Research Paper - Grand chase rufus 4th job - Public speaking course reflection essay - Using the financial statements for the snider corporation - Danfoss expansion valve bulb position - Essay: Reading Analysis - Hu2000 week 5 assignment worksheet - Amp flexible lifetime super usi - Ethernet cable color order - Discussion - Weft faced twill weave - 3.2 1.9 packet tracer answers - Anti forensics techniques detection and countermeasures - Awakenings movie assignment answer key - 1.08 macbeth plot analysis - Faith evans corporation is a regional company which is an sec registrant - Good sentence starters for persuasive writing - Graded assignment lab report levers and pulleys - Which of the following functions best describes this graph - Sociology Help - Dan mcclure owns a thriving independent bookstore - Menschen a2 1 übungen - Macleay regis potts point - Presentational techniques english gcse - Papergraders - Homeowner warranty insurance nsw - HISTORY PAPER NEEDED BY 12PM 8/9 6 PAGES - Describe domino's business model and business strategy - Warman international ltd v dwyer summary - Latin tense endings chart - Determination of ascorbic acid in vitamin c tablets lab report - Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.). - Homework market reviews - Mathisfun games tower of hanoi - Lesson Plan - Accuweather arnold md - 75 cl in ml - Dulce et decorum est criticism - Clinical decision support system, healthcare reimbursement, health-related views and laws are shaped by social, political, and historical factors discussion - The wounded knee massacre answer key - Burj al arab documentary - North hertfordshire recycling centres - Functional areas of strategic management - Cisco 857 ios download - Writing apus style guides - Fm mattsson mixer cartridge - Among shinto values and practices which task is quite important - Julius caesar conclusion paragraph - Operation anaconda analytical essay - What is a prodrug - 0.04 in scientific notation - Rex c100 change to fahrenheit - Slow smoke bistro redcliffe - Health promotion model nursing theory - Computer security lab manual - 66a callows road bulli - Southwestern university's food service case study - Normandy trident group pbc - Hard rock cafe operations management in services case study - Prada group annual report - Bid Response Proposal Presentation - Air canada flight 143 - What is the difference between linear regression and logistic regression - Assignment: Differentiate Between Scholarly or Peer Reviewed and Popular Articles - Hay for sale herefordshire - The warriner school teachers - Plain revelation ranko stefanovic pdf - Disney parks and resorts strategy - Literary essay on wonder - Hpe storevirtual vsa download - Shprintze fiddler on the roof - History of rock and roll thomas larson 6th edition - Selecting and discussing your topic - Coldfusion get ip address - Little caesars business model - Racv emergency roadside assist - Food dye lab report - Http faculty washington edu herronjc softwarefolder allelea1 html - Hospitality hotels forecasts monthly labor needs - The accounts of delphinia dreams, inc. showed the following balances at the beginning of october: - Freak the mighty chapter 16 summary - Program Reflection 6 - Mean value theorem taylor series - Generating hydrogen gas lab answers - Research and organize literature for the Interdisciplinary paper. - Bose companion 3 series 1 manual