Page 197 - CISSO_Prep_ Guide
P. 197

the network are IDS (intrusion detection systems) and IPS
            (intrusion prevention systems) that monitor record and may
            block suspicious activity. The application firewall in the DMZ is
            behind a packet-filtering router to clear out most of the bad
            traffic before it gets to the application firewall.
            Inside on the network is more segmentation between various
            departments and systems to restrict traffic from areas it does not
            need to access.

            Each device connected to the network is also secured with
            antivirus, a firewall, and Host-based IPS.
            The above is an example of a layered network defense.



            Encryption of Network Traffic
            There are several ways to encrypt network traffic depending on
            the layer in the OSI stack, where the encryption is to be done. In
            many cases, data may be encrypted more than once. For
            example, an encrypted email sent over a wireless connection
            will be encrypted at the application layer (email) and again at
            the data link layer (WPA2).



            Datalink layer encryption
            The lowest level of encryption is at the data link layer. This
            encrypts the data between two adjacent devices. An example of
            this is to use WPA2 to encrypt data between a laptop and the
            wireless access point- a link-layer encryption. The problem with
            link-layer encryption is that the data must be decrypted at each
            end of the link, and if the data is going to transmit across
            another link, then the data must be re-encrypted. An example of
            this problem is when an organization is using handheld wireless
   192   193   194   195   196   197   198   199   200   201   202