DOC PREVIEW
DMC ITSY 2400 - Chapter 7 Physical and Network Topology Security

This preview shows page 1-2-3-22-23-24-45-46-47 out of 47 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Chapter 7ObjectivesPhysical SecurityWorkstation SecuritySlide 5Server Security (Continued)Slide 7Configuring Screen SaversConfiguring a NetWare Screen Saver (Continued)Configuring a NetWare Screen SaverNetwork DevicesSecuring Network DevicesDesigning a Network Topology for SecurityBus TopologySlide 15Ring TopologySlide 17Star TopologySlide 19Slide 20Logical Bus Networks in a Physical Star LayoutCommunications Media and Network SecurityCoaxial CableThick Coaxial CableThin Coaxial Cable (Thinnet)Twisted-Pair CableSlide 27Fiber-Optic CableSlide 29Wireless TechnologiesSlide 31Using Structured DesignGuidelines for Cable Installation (Continued)Slide 34Slide 35Structured Wiring RequirementsSlide 37Structured Wiring DesignStructured Network DesignSlide 40Vertical Wiring PrinciplesCentralized ManagementUsing Virtual LANsUsing Network Redundancy for SecuritySlide 45Slide 46SummaryGuide to Operating System SecurityChapter 7Physical and Network Topology Security2 Guide to Operating System SecurityObjectivesExplain physical security methods for workstations, servers, and network devicesImplement a network topology for securityExplain network communications media in relation to securityUse structured network design for security3 Guide to Operating System SecurityPhysical SecurityLimiting physical accessLocation of equipmentConstruction qualityDevices to protectWorkstationsServersNetwork devices and communications media4 Guide to Operating System SecurityWorkstation SecurityPassword protect user accountsConfigure screen saver with a passwordLog off or turn off computers when not in useLock office doorsKeep ventilation holes unobstructedKeep liquids away from computer5 Guide to Operating System SecurityWorkstation Security6 Guide to Operating System SecurityServer Security (Continued)Centralized versus decentralized considerationsEnvironmentally controlled computer roomStrong access controlsCipher locks on locked doorsPower regulation devices7 Guide to Operating System SecurityServer Security (Continued)Motion sensorsCamera-monitored entrances and equipmentFire detection and suppression equipmentScreen savers for servers8 Guide to Operating System SecurityConfiguring Screen SaversWindows ServerUse screen saver options with passwords for serversRed Hat Linux 9.xLock a screen using screen saverNetWareSCRSAVER command at the consoleSECURE CONSOLE command9 Guide to Operating System SecurityConfiguring a NetWare Screen Saver (Continued)10 Guide to Operating System SecurityConfiguring a NetWare Screen Saver11 Guide to Operating System SecurityNetwork DevicesAccess serversBridgesChassis hubsFirewallsHubsMultiplexersRepeatersRoutersSwitchesTransceiversUPS12 Guide to Operating System SecuritySecuring Network DevicesPlace central wiring and network devices in wiring closets that follow EIA/TIA-569 standardsTelecommunications roomMain cross-connectIntermediate cross-connectLocate wiring closets away from sources of EMI and RFI13 Guide to Operating System SecurityDesigning a Network Topology for SecurityMain network topologiesBusRingStarBus-star14 Guide to Operating System SecurityBus TopologyCable runs from one computer to the next, like a chainTerminators connect to each bus cable segmentDisadvantagesEasily compromised by removing a terminatorEasy for unauthorized person to tap into cable segment15 Guide to Operating System SecurityBus Topology16 Guide to Operating System SecurityRing TopologyContinuous path for data; no logical beginning or ending point; no terminatorsEasier to manage, more reliable, and more secure than the busMore expensive than the bus17 Guide to Operating System SecurityRing Topology18 Guide to Operating System SecurityStar TopologyMultiple stations attached to central hub or switchAllows you to emphasize security, efficiency, and reliability19 Guide to Operating System SecurityStar Topology20 Guide to Operating System SecurityStar TopologyAdvantagesWide variety of equipment availableUnauthorized taps are difficultEasier to manage than the busExpansion optionsDisadvantagesHub or switch is single point of failureRequires more cable than bus21 Guide to Operating System SecurityLogical Bus Networks in a Physical Star LayoutMost common topologyAdvantagesNo exposed terminators to pose security riskExpansion capabilities22 Guide to Operating System SecurityCommunications Media and Network SecurityCoaxial cableTwisted-pair cableFiber-optic cableWireless technologies23 Guide to Operating System SecurityCoaxial CableCopper wire constructionThick and thin varietiesSuitabilityOlder LANsLANs with strong sources of signal interference24 Guide to Operating System SecurityThick Coaxial Cable25 Guide to Operating System SecurityThin Coaxial Cable (Thinnet)26 Guide to Operating System SecurityTwisted-Pair CableCopper wire constructionShielded twisted-pair (STP) and unshielded twisted-pair (UTP)Most commonly used cabling27 Guide to Operating System SecurityTwisted-Pair Cable28 Guide to Operating System SecurityFiber-Optic CableGlass (usually) or plastic cableSingle mode and multimodeSuitabilityHigh-speed LAN and WAN accessTo connect networks between different locationsIn situations with significant electrical interferenceWhere security is a concern29 Guide to Operating System SecurityFiber-Optic Cable30 Guide to Operating System SecurityWireless TechnologiesRadio, infrared, or microwaveSuitabilityDifficult or too expensive to use cableWhen flexibility to move network hosts and devices is required31 Guide to Operating System SecurityComparing Cable Types32 Guide to Operating System SecurityUsing Structured DesignFollow accepted guidelines for cable installationDeploy structured wiring designImplement structured network design33 Guide to Operating System SecurityGuidelines for Cable Installation (Continued)Meet or exceed maximum bandwidth requirementsCategory 5 or better UTP cableMultimode fiber-optic riser cable between floorsIEEE specificationsSingle-mode fiber-optic cable for long runs34 Guide to Operating System SecurityGuidelines for Cable Installation (Continued)Wireless options where neededStar-based cable plantsHigh-quality cableBuilding codes (eg, plenum


View Full Document

DMC ITSY 2400 - Chapter 7 Physical and Network Topology Security

Download Chapter 7 Physical and Network Topology Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Chapter 7 Physical and Network Topology Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Chapter 7 Physical and Network Topology Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?