To build a secure network, we must consider the design and components of a secure network. Identify and mitigate threats related to our network implementation to ensure organizational security.
VPN allows us to access the local network from outside. We use authentication to ensure that only authorized users can join the VPN.
It is good practice to encrypt phone traffic. War dialing gets used to identify the network of the organization.
Can be configured with policies that allow devices to connect to the network.
If the server does not meet the requirements, it will get fixed by the health check server.
When the problems get resolved, it can join the network domain controller.
This server will perform baseline checks of the programs and outdated or missing drivers on the system. Everything will be installed according to the checklist if the user’s computer fails to meet the requirements.
Make sure they need to defeat different layers of technology to get access to the servers. So the network does not get compromised if one device fails.
Let us share computer resources and run multiple operating systems on one hardware platform.
With virtualizations in which a personal computer gets hosted, install a hypervisor on the host. To use a hypervisor, VTX or AMD-V must get used in the bios settings. The hypervisor is a software environment to build computers into computers. It can share resources like
It is possible to run multiple servers and machines on the same host using the power hypervisor software environment. The software would get installed there. Using a hypervisor can also save us money because
Virtualization allows the business to buy a powerful server that can do everything instead of separate boxes that all do different jobs. A hypervisor allows it to utilize the howl system and ensure it is always working and using the hardware to its fullest potential.
Virtualization allows testing the environments. Do not deploy them straight away. Try them out first to see if they work correctly.
It is possible to cripple the virtual host machines or, worse yet, to have the hypervisor hijacked by a malicious intruder if we do not secure our virtual host machines. Christopher Hoff sounded the alarm about the unintended consequences of virtualization and cloud computing in 2008 in a slide (slide # 23) he presented in his deck titled “The Four Horsemen of the Virtualization Security Apocalypse” 65 In his deck, Hoff outlined the many and varied potential vulnerabilities of virtualized systems and identified the various attack surfaces and threat avenues they face. “ He categorizes seven modes of attack:
It is not a single point of failure so that multiple people can learn multiple roles; if one person is missing, somebody else is available. It helps ensure the availability concept of the CIA triad (Confidentiality, Integrity & Availability).
Source:
CompTIA Security+ Study Guide | Cybrary
Video series on these topics:
Professor Messer’s 220-1102 A+ Study Group – January 2023
How to Pass Your N10-008 Network+ Exam
CompTIA Linux+: Introduction to Linux & the Command Line #1
How to Pass your SY0-601 Security+ Exam
CompTIA Cloud+ Certification EXAM NUMBER: CV0-003 Learning Playlist Intro
CompTIA CySA+ Full Course Part 01: What is the CompTIA CySA+ Exam?
Nmap Basics For Beginners – COMPTIA Pentest+ Course Preparation TryHackMe
01# CompTIA Advanced Security Practitioner (CASP) – Introduction