Page 847 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 847

Summary


               The tasks of designing, deploying, and maintaining security on a
               network require intimate knowledge of the technologies involved in
               networking. This includes protocols, services, communication

               mechanisms, topologies, cabling, endpoints, and networking devices.

               The OSI model is a standard against which all protocols are evaluated.
               Understanding how the OSI model is used and how it applies to real-
               world protocols can help system designers and system administrators
               improve security. The TCP/IP model is derived directly from the
               protocol and roughly maps to the OSI model.


               Most networks employ TCP/IP as the primary protocol. However,
               numerous subprotocols, supporting protocols, services, and security
               mechanisms can be found in a TCP/IP network. A basic understanding
               of these various entities can help you when designing and deploying a
               secure network.

               In addition to routers, hubs, switches, repeaters, gateways, and
               proxies, firewalls are an important part of a network’s security. There

               are several types of firewalls: static packet filtering, application-level
               gateway, circuit-level gateway, stateful inspection, deep-packet
               inspection, and next-gen.

               Converged protocols are common on modern networks, including
               FCoE, MPLS, VoIP, and iSCSI. Software-defined networks and
               content-distribution networks have expanded the definition of
               network as well as expanded the use cases for it. A wide range of

               hardware components can be used to construct a network, not the
               least of which is the cabling used to tie all the devices together.
               Understanding the strengths and weaknesses of each cabling type is
               part of designing a secure network.

               Wireless communications occur in many forms, including cell phone,
               Bluetooth (802.15), RFID, NFC, and networking (802.11). Wireless
               communication is more vulnerable to interference, eavesdropping,

               denial of service, and man-in-the-middle attacks.
   842   843   844   845   846   847   848   849   850   851   852