Network Characteristics and Topologies

Now that we have discussed the layered approach to networking, we can apply this information to understanding how communications and more importantly the securing of communications occur. As one would expect, different protocols and networks will require different methods of securing them. By understanding how networks function, we can determine the most effective way to secure those technologies.

IN THE FIELD: USING COMMON ATTRIBUTES

Virtually all networks share common attributes. This is a bit of a double-edged sword. On one hand, it means that security professionals have a bit of a guideline in terms of how technologies function and how to deploy those technologies. On the other hand, it also means that ...

Get CISSP Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.