Chapter Summary

This chapter provided an overview of basic security concepts and controls that can be used by administrators to secure physical devices and media. One of the most important topics, controlling who can access the network and how, was further expanded.

KEY TERMS

  • Degaussing

  • Demilitarized zone (DMZ)

  • Extranet

  • FCAPS

  • Firewall

  • Intranet

  • Intrusion detection system (IDS)

  • Magnetic overwrite

  • Network address translation (NAT)

  • Public branch exchange (PBX)

  • Public switched telephone network (PSTN)

  • Reconnaissance

  • Remote monitoring (RMON)

  • Router

  • Shielded twisted pair (STP)

  • Simple Network Management Protocol (SNMP)

  • Switch

  • Unshielded twisted pair (UTP)

  • Virtual local area network (VLAN)

Firewalls are the focal points of overall network access policy. Several types of ...

Get Security+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.