Page 840 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 840

connect to the organization’s network.




                             A device owned by an individual can be referenced using

                  any of these terms: portable device, mobile device, personal mobile
                  device (PMD), personal electronic device or portable electronic

                  device (PED), and personally owned device (POD).



               For more information on managing the security of mobile devices,
               please see Chapter 9, “Security Vulnerabilities, Threats, and
               Countermeasures,” specifically the section “Assess and Mitigate
               Vulnerabilities in Mobile Systems.”


               LAN Technologies

               There are three main types of LAN technologies: Ethernet, Token

               Ring, and FDDI. A handful of other LAN technologies are available,
               but they are not as widely used. Only the main three are addressed on
               the CISSP exam. Most of the differences between LAN technologies
               exist at and below the Data Link layer.


               Ethernet

               Ethernet is a shared-media LAN technology (also known as a
               broadcast technology). That means it allows numerous devices to

               communicate over the same medium but requires that the devices take
               turns communicating and performing collision detection and
               avoidance. Ethernet employs broadcast and collision domains. A
               broadcast domain is a physical grouping of systems in which all the
               systems in the group receive a broadcast sent by a single system in the
               group. A broadcast is a message transmitted to a specific address that
               indicates that all systems are the intended recipients.


               A collision domain consists of groupings of systems within which a
               data collision occurs if two systems transmit simultaneously. A data
               collision takes place when two transmitted messages attempt to use
               the network medium at the same time. It causes one or both of the
               messages to be corrupted.
   835   836   837   838   839   840   841   842   843   844   845