Chapter 8

Securing the Network Infrastructure


8.01     Designing Secure Networks

8.02     Protecting Sensitive Data

8.03     Network Port Security

8.04     Implementing Firewalls


Planning the design of a secure network architecture is an ongoing task, as network requirements evolve over time. New technologies in network switches, firewalling, virtual private networks (VPNs), and threat mitigation present a need for periodic network security evaluations.

Network perimeter security can be achieved using hardware firewalls, proxy servers, network access control configurations, and VPNs. VPN solutions can require client-side VPN software or can be clientless, meaning existing common software such as a web browser ...

Get CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601), 4th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.