Page 820 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 820

device deployment, such as devices always deployed in parallel or

                  in series? Is the exterior of a device usually sufficient to indicate its
                  function, or must you look up its model number?


               LAN Extenders A LAN extender is a remote access, multilayer

               switch used to connect distant networks over WAN links. This is a
               strange beast of a device in that it creates WANs, but marketers of this
               device steer clear of the term WAN and use only LAN and extended
               LAN. The idea behind this device was to make the terminology easier
               to understand and thus make the product easier to sell than a normal
               WAN device with complex concepts and terms tied to it. Ultimately, it

               was the same product as a WAN switch or WAN router.



                             While managing network security with filtering devices

                  such as firewalls and proxies is important, we must not overlook

                  the need for endpoint security. Endpoints are the ends of a
                  network communication link. One end is often at a server where a
                  resource resides, and the other end is often a client making a
                  request to use a network resource. Even with secured
                  communication protocols, it is still possible for abuse, misuse,

                  oversight, or malicious action to occur across the network because
                  it originated at an endpoint. All aspects of security from one end to
                  the other, often called end-to-end security, must be addressed. Any
                  unsecured point will be discovered eventually and abused.
   815   816   817   818   819   820   821   822   823   824   825