Page 374 - StudyBook.pdf
P. 374

358    Chapter 6 • Infrastructure Security: Devices and Media

             Introduction


             Implementing infrastructure security is one of the biggest parts of being a
             Security+ technician.As such, device and media security is covered extensively in
             the Security+ exam. Security+ technicians must know all of the components of a
             network and all of the potential issues that may occur regarding every piece of
             common infrastructure within a network environment.
                 This chapter covers all of the critical network infrastructure including devices
             such as firewalls, routers, switches, servers, workstations, and the cabling that con-
             nects them all together, and looks at how to connect these items with a wireless
             connection. It also looks at Intrusion Detection System (IDS) devices and how
             they fit in the topology, as well as other types of network monitoring equipment.
                 Lastly, this chapter looks at how hard disks, Smart Cards, and other forms of
             media are secured. Not only is it important to understand how all of the pieces fit
             together, but it is also important to understand how each media form is vulnerable to
             attack and exploitation and how the Security+ technician needs to view each one.



              EXAM WARNING

                  According to the CompTIA objectives for the Security+ exam, infrastruc-
                  ture security comprises 20 percent of the Security+ exam. Approximately
                  one-third of this is related to devices and media. Firewalls, routers,
                  switches, IDSes, and all types of media are covered extensively on the
                  Security+ exam.






             Device-based Security

             A large component of infrastructure security is based on the proper implementa-
             tion of hardware devices in a network. By implementing and configuring hardware
             devices correctly, Security+ technicians can greatly decrease their vulnerability to
             attack. For example, properly configuring a firewall can help protect networks from
             external attacks.
                 The Security+ exam focuses on the situations in which firewalls should be used
             and the appropriate implementation of the devices. In many security implementa-
             tions, the correct devices are located in the correct places on the network but are
             incorrectly configured, therefore leaving the network vulnerable to attack.



          www.syngress.com
   369   370   371   372   373   374   375   376   377   378   379