Page 433 - StudyBook.pdf
P. 433

Infrastructure Security: Devices and Media • Chapter 6  417

                    Diskettes are also magnetic-based and allow you to store data in another
                 portable format. Most systems have no need for floppy disk drives with the popu-
                 larity of CD-ROMs, so it is not a bad idea to remove these drives from users’
                 workstations.This helps in preventing viruses from being introduced to the net-
                 work from users bringing in infected diskettes.
                    Flashcards are based on memory chips and are very reliable.They never wear
                 out if well taken care of. Many routers use flashcards for storing configuration
                 information, and they are also commonly used for storing pictures from digital
                 cameras. Encrypting the data on flashcards is a good idea and allows you to keep
                 your data secure.
                    Smart Cards are credit card-sized devices that allow administrators to store lim-
                 ited amounts of data.They are often used for identification or as a small data store
                 due to their size and low cost. Many also offer authentication capabilities by using a
                 built-in processor.This helps keep the personal and confidential information stored
                 on these cards secure.

                 Exam Objectives Fast Track



                 Device-based Security


                       Firewalls, routers, IDSes, and switches are devices that can all help secure a
                         network as long as they are properly configured.
                       Wireless, modems, RAS, PBXs, and VPNs all allow remote access to a
                         computer or telecommunications network and should be made as secure
                         as possible to prevent intrusion or attacks.
                       Network monitoring or diagnostic equipment, workstations, servers, and
                         mobile devices are all capable of being abused by intruders when attached
                         to a network, and should therefore have their communications encrypted
                         when possible, and be protected with strong passwords

                 Media-based Security


                       Coax, UPT, STP, and fiber are all media used to physically connect devices
                         to a network, and each has its own benefits and vulnerabilities.







                                                                              www.syngress.com
   428   429   430   431   432   433   434   435   436   437   438