Page 374 - StudyBook.pdf
P. 374
358 Chapter 6 • Infrastructure Security: Devices and Media
Introduction
Implementing infrastructure security is one of the biggest parts of being a
Security+ technician.As such, device and media security is covered extensively in
the Security+ exam. Security+ technicians must know all of the components of a
network and all of the potential issues that may occur regarding every piece of
common infrastructure within a network environment.
This chapter covers all of the critical network infrastructure including devices
such as firewalls, routers, switches, servers, workstations, and the cabling that con-
nects them all together, and looks at how to connect these items with a wireless
connection. It also looks at Intrusion Detection System (IDS) devices and how
they fit in the topology, as well as other types of network monitoring equipment.
Lastly, this chapter looks at how hard disks, Smart Cards, and other forms of
media are secured. Not only is it important to understand how all of the pieces fit
together, but it is also important to understand how each media form is vulnerable to
attack and exploitation and how the Security+ technician needs to view each one.
EXAM WARNING
According to the CompTIA objectives for the Security+ exam, infrastruc-
ture security comprises 20 percent of the Security+ exam. Approximately
one-third of this is related to devices and media. Firewalls, routers,
switches, IDSes, and all types of media are covered extensively on the
Security+ exam.
Device-based Security
A large component of infrastructure security is based on the proper implementa-
tion of hardware devices in a network. By implementing and configuring hardware
devices correctly, Security+ technicians can greatly decrease their vulnerability to
attack. For example, properly configuring a firewall can help protect networks from
external attacks.
The Security+ exam focuses on the situations in which firewalls should be used
and the appropriate implementation of the devices. In many security implementa-
tions, the correct devices are located in the correct places on the network but are
incorrectly configured, therefore leaving the network vulnerable to attack.
www.syngress.com