Chapter 7ObjectivesPhysical SecurityWorkstation SecuritySlide 5Server Security (Continued)Slide 7Configuring Screen SaversConfiguring a NetWare Screen Saver (Continued)Configuring a NetWare Screen SaverNetwork DevicesSecuring Network DevicesDesigning a Network Topology for SecurityBus TopologySlide 15Ring TopologySlide 17Star TopologySlide 19Slide 20Logical Bus Networks in a Physical Star LayoutCommunications Media and Network SecurityCoaxial CableThick Coaxial CableThin Coaxial Cable (Thinnet)Twisted-Pair CableSlide 27Fiber-Optic CableSlide 29Wireless TechnologiesSlide 31Using Structured DesignGuidelines for Cable Installation (Continued)Slide 34Slide 35Structured Wiring RequirementsSlide 37Structured Wiring DesignStructured Network DesignSlide 40Vertical Wiring PrinciplesCentralized ManagementUsing Virtual LANsUsing Network Redundancy for SecuritySlide 45Slide 46SummaryGuide to Operating System SecurityChapter 7Physical and Network Topology Security2 Guide to Operating System SecurityObjectivesExplain physical security methods for workstations, servers, and network devicesImplement a network topology for securityExplain network communications media in relation to securityUse structured network design for security3 Guide to Operating System SecurityPhysical SecurityLimiting physical accessLocation of equipmentConstruction qualityDevices to protectWorkstationsServersNetwork devices and communications media4 Guide to Operating System SecurityWorkstation SecurityPassword protect user accountsConfigure screen saver with a passwordLog off or turn off computers when not in useLock office doorsKeep ventilation holes unobstructedKeep liquids away from computer5 Guide to Operating System SecurityWorkstation Security6 Guide to Operating System SecurityServer Security (Continued)Centralized versus decentralized considerationsEnvironmentally controlled computer roomStrong access controlsCipher locks on locked doorsPower regulation devices7 Guide to Operating System SecurityServer Security (Continued)Motion sensorsCamera-monitored entrances and equipmentFire detection and suppression equipmentScreen savers for servers8 Guide to Operating System SecurityConfiguring Screen SaversWindows ServerUse screen saver options with passwords for serversRed Hat Linux 9.xLock a screen using screen saverNetWareSCRSAVER command at the consoleSECURE CONSOLE command9 Guide to Operating System SecurityConfiguring a NetWare Screen Saver (Continued)10 Guide to Operating System SecurityConfiguring a NetWare Screen Saver11 Guide to Operating System SecurityNetwork DevicesAccess serversBridgesChassis hubsFirewallsHubsMultiplexersRepeatersRoutersSwitchesTransceiversUPS12 Guide to Operating System SecuritySecuring Network DevicesPlace central wiring and network devices in wiring closets that follow EIA/TIA-569 standardsTelecommunications roomMain cross-connectIntermediate cross-connectLocate wiring closets away from sources of EMI and RFI13 Guide to Operating System SecurityDesigning a Network Topology for SecurityMain network topologiesBusRingStarBus-star14 Guide to Operating System SecurityBus TopologyCable runs from one computer to the next, like a chainTerminators connect to each bus cable segmentDisadvantagesEasily compromised by removing a terminatorEasy for unauthorized person to tap into cable segment15 Guide to Operating System SecurityBus Topology16 Guide to Operating System SecurityRing TopologyContinuous path for data; no logical beginning or ending point; no terminatorsEasier to manage, more reliable, and more secure than the busMore expensive than the bus17 Guide to Operating System SecurityRing Topology18 Guide to Operating System SecurityStar TopologyMultiple stations attached to central hub or switchAllows you to emphasize security, efficiency, and reliability19 Guide to Operating System SecurityStar Topology20 Guide to Operating System SecurityStar TopologyAdvantagesWide variety of equipment availableUnauthorized taps are difficultEasier to manage than the busExpansion optionsDisadvantagesHub or switch is single point of failureRequires more cable than bus21 Guide to Operating System SecurityLogical Bus Networks in a Physical Star LayoutMost common topologyAdvantagesNo exposed terminators to pose security riskExpansion capabilities22 Guide to Operating System SecurityCommunications Media and Network SecurityCoaxial cableTwisted-pair cableFiber-optic cableWireless technologies23 Guide to Operating System SecurityCoaxial CableCopper wire constructionThick and thin varietiesSuitabilityOlder LANsLANs with strong sources of signal interference24 Guide to Operating System SecurityThick Coaxial Cable25 Guide to Operating System SecurityThin Coaxial Cable (Thinnet)26 Guide to Operating System SecurityTwisted-Pair CableCopper wire constructionShielded twisted-pair (STP) and unshielded twisted-pair (UTP)Most commonly used cabling27 Guide to Operating System SecurityTwisted-Pair Cable28 Guide to Operating System SecurityFiber-Optic CableGlass (usually) or plastic cableSingle mode and multimodeSuitabilityHigh-speed LAN and WAN accessTo connect networks between different locationsIn situations with significant electrical interferenceWhere security is a concern29 Guide to Operating System SecurityFiber-Optic Cable30 Guide to Operating System SecurityWireless TechnologiesRadio, infrared, or microwaveSuitabilityDifficult or too expensive to use cableWhen flexibility to move network hosts and devices is required31 Guide to Operating System SecurityComparing Cable Types32 Guide to Operating System SecurityUsing Structured DesignFollow accepted guidelines for cable installationDeploy structured wiring designImplement structured network design33 Guide to Operating System SecurityGuidelines for Cable Installation (Continued)Meet or exceed maximum bandwidth requirementsCategory 5 or better UTP cableMultimode fiber-optic riser cable between floorsIEEE specificationsSingle-mode fiber-optic cable for long runs34 Guide to Operating System SecurityGuidelines for Cable Installation (Continued)Wireless options where neededStar-based cable plantsHigh-quality cableBuilding codes (eg, plenum
View Full Document