Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Spencer supplies stock is currently selling

17/03/2021 Client: saad24vbs Deadline: 2 Day

Security+ Guide to Network Security Fundamentals, Fourth Edition

Chapter 6

Network Security

1

Security Through Network Devices

Not all applications designed, written with security in mind

Network must provide protection

Networks with weak security invite attackers

Aspects of building a secure network

Network devices

Network technologies

Design of the network itself

Security+ Guide to Network Security Fundamentals, Fourth Edition

2

2

Standard Network Devices

Security features found in network hardware

Provide basic level of security

Open Systems Interconnection (OSI) model

Network devices classified based on function

Standards released in 1978, revised in 1983, still used today

Illustrates:

How network device prepares data for delivery

How data is handled once received

Security+ Guide to Network Security Fundamentals, Fourth Edition

3

3

4

Table 6-1 OSI reference model

Using the seven layers of the OSI model, we can explore more fully how data can be transferred between two networked computers

4

Standard Network Devices

Hubs

Connect multiple Ethernet devices together:

To function as a single network segment

Ignorant of data source and destination

Rarely used today because of inherent security vulnerability

5

Switches

Can forward frames sent to that specific device or broadcast to all devices

Use MAC address to identify devices

Provide better security than hubs

5

Security+ Guide to Network Security Fundamentals, Fourth Edition

6

Figure 6-1 Port mirroring

© Cengage Learning 2012

6

Standard Network Devices (cont’d.)

Network administrator should be able to monitor network traffic

Helps identify and troubleshoot network problems

Traffic monitoring methods

Port mirroring

Network tap (test access point)

Sniffer Software

Security+ Guide to Network Security Fundamentals, Fourth Edition

7

7

8

Sniffer Software

Switch Defenses

Use a switch that can close ports with too many MAC addresses

Configure the switch so that only one port can be assigned per MAC address

Use an ARP detection appliance

Secure the switch in a locked room

Keep network connections secure by restricting physical access

8

Standard Network Devices

Load balancers

Help evenly distribute work across a network

Allocate requests among multiple devices

Ex: port 80 for web HTTP

Laymance Apache Load Balancers

9

9

Load Balancing Security

Security advantages of load balancing

Can stop attacks directed at a server or application

Can detect and prevent denial-of-service attacks

Some can deny attackers information about the network

Hide HTTP error pages

Remove server identification headers from HTTP responses

Security+ Guide to Network Security Fundamentals, Fourth Edition

10

10

Removing Headers for Server Security

Typically we have 3 response headers which many people want to remove for security reason.

Server - Specifies web server version.

X-Powered-By - Indicates that the website is "powered by ASP.NET."

X-AspNet-Version - Specifies the version of ASP.NET used.

msdn blogs

Security+ Guide to Network Security Fundamentals, Fourth Edition

11

11

Security+ Guide to Network Security Fundamentals, Fourth Edition

12

Hardware-based network firewall inspects packets

Looks deeply into packets that carry HTTP traffic

Web browsers, FTP

Can block specific sites or specific known attacks

Can block XSS and SQL injection attacks

Firewalls

12

Security+ Guide to Network Security Fundamentals, Fourth Edition

13

Proxy Servers and Reverse Proxy

Computer or application that intercepts and processes user requests

Reverse proxy

Routes incoming requests to correct server

Reverse proxy’s IP address is visible to outside users

Internal server’s IP address hidden

Stronger security

Intercept malware

Hide client system’s IP address

13

Security+ Guide to Network Security Fundamentals, Fourth Edition

14

Figure 6-5 Configuring access to proxy servers

© Cengage Learning 2012

14

Security+ Guide to Network Security Fundamentals, Fourth Edition

15

Figure 6-6 Reverse proxy

© Cengage Learning 2012

Reverse Proxy Server

I am now the user

15

Network Security Hardware (cont’d.)

Spam filters

Enterprise-wide spam filters block spam before it reaches the host

Email systems use three protocols

Simple Mail Transfer Protocol (SMTP)

Handles outgoing mail

Post Office Protocol (POP)

Handles incoming mail

Internet Message Access Protocol (IMAP)

Handles reading email from many different devices

Security+ Guide to Network Security Fundamentals, Fourth Edition

16

16

Network Security Hardware (cont’d.)

Security+ Guide to Network Security Fundamentals, Fourth Edition

Spam filters installed with the SMTP server

Filter configured to listen on port 25

Pass non-spam e-mail to SMTP server listening on another port

Method prevents SMTP server from notifying spammer of failed message delivery

Roll MS Outlook Junk Email Filter

17

17

Network Security Hardware (cont’d.)

Virtual private network (VPN)

Uses unsecured network as if it were secure

All data transmitted between remote device and network is encrypted

Hardware-based generally have better security

Software-based have more flexibility in managing network traffic

Security+ Guide to Network Security Fundamentals, Fourth Edition

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Custom Coursework Service
Math Exam Success
Homework Guru
Peter O.
Professional Accountant
Calculation Guru
Writer Writer Name Offer Chat
Custom Coursework Service

ONLINE

Custom Coursework Service

I have read your project details. I can do this within your deadline.

$19 Chat With Writer
Math Exam Success

ONLINE

Math Exam Success

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$27 Chat With Writer
Homework Guru

ONLINE

Homework Guru

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$15 Chat With Writer
Peter O.

ONLINE

Peter O.

I will cover all the points which you have mentioned in your project details.

$23 Chat With Writer
Professional Accountant

ONLINE

Professional Accountant

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$16 Chat With Writer
Calculation Guru

ONLINE

Calculation Guru

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$26 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Cryptography - Kuleshov effect rear window - Letter from birmingham jail outline - Article Analysis 1 - Cisco aci interview questions and answers pdf - Check the facts dbt - Moral choices an introduction to ethics 4th edition - As 2601 the demolition of structures - Molarity of 3 hydrogen peroxide - Born a crime figurative language - Www padowan dk graph 4.4 - North lake senior campus - Essay assignment: social structure and health in everyday life - Load restraint guide wa - As4 3501 6 carbon epoxy properties - Apple's current assets and liabilities - Assignment - Fast inverse square root - Cherry pink and apple blossom white musical ideas - Ocr a level biology multiple choice questions - Reading theory - Romeo and juliet diary entry act 1 scene 5 - MEMO - Fan dampers and vanes - Dr martin luther king library san jose - Advertising and public relations research jugenheimer pdf - Cash cow rising star - Synthesis Paper - Shame by gregory questions and answers - Analysis of algorithms cheat sheet - Policies and procedures manual for small business - Theory of bureaucratic caring - Please respond if you can answer in 6-6.5 hours - 05-la2 - Amortization schedule calculator bret whissel - Ntsb party system - 4 topics and 1 page each - Child development its nature and course 5th edition pdf - Henley and grange rsl - 34 lucca walk mernda - Lesson 7 2 problem solving ratios in similar polygons - Socrates dialogue with euthyphro - Chemistry - Allen the alien bullying no way - An electric motor rotating a grinding wheel at - Green company's common stock is currently selling - Excel chapter 4 grader project 2018 - TLMT601 Week 3 Case Study 1 - Harvard mit cross registration - Rigid in outlook harsh crossword clue - Bus to fairfield hospital - Strategies for Academic Portfolios - How many cards in sorry game - Why is the narrator in billy collins marginalia so tickled - Unit 6 Public administration Discussion - Why kentucky fried chicken change its name to kfc - Road and maritime services - Boeing defence space and security - Everyday use analysis essay - Student loan debt burden forbearance - Bs o ring sizes - Why is pressure a sensible reading to measure circulatory health - Lyrics with poetic devices - Pradeep nair csuf - Salvete in mundo domi vostrae estis translation - Strategic management accounting syllabus - The true statement about cost behavior is that: - Discussion 1 ,250 words by 08/25 /2020 at 8.00 pm ,reply 1 and 2 150 words each one by 08/25/2020 at 8:00 pm ,add references and citations for all assignments - Romeo and juliet sonnet - Ict year 10 coursework - Kings cross dundee audiology - Gunther mirror mastic home depot - Monomial factors of polynomials - To what extent is the creation of small business enterprises promoted by the government of the Turks and Caicos Islands - Chingford plains car park - Essay #1: Ethics Lit. - Victoria transport policy institute - When does prime movers start - Claude stein natural singer workshop - Assignments - Secure attachments contribute to children's compliance because - Complex number polar form exponential - What does msu mean in medical terms - Reaserch on KONSTANTIN MELNIKOV - Kwl chart special education and learning disabilities - Erikson's stages of development chart - Honor and Emotional Reactions - Wipe aide toilet paper moistener - Is pos a gatekeeper or open access - Guy turner reserve tennis club - Teaching grammar through stories - Review two articles - How to find equilibrium solution of differential equation - How much lbs are in a ton - E121 Week 5 - Final Paper - How do glaciers cause erosion - End of shift report restaurant - Cisco nexus 7000 price - Short answer exam questions - U substitution practice worksheet