1.2 Apply and implement secure network administration principles
It takes more than just having the right hardware and software installed to make a secure network. You also need proper configuration and ongoing maintenance. This is known as network administration. The following items are secure network administration principles.
Rule-based management
Rule-based management is the concept of controlling the security of communications and IT events through rule- or filter-driven systems. Firewalls, proxies, routers, IDS, IPS, antivirus, and more are examples of rule-based security managements. Each of these systems has a set of rules. Each rule is either an explicit allow or deny. If an event or packet does not match any rule, it should be denied ...
Get CompTIA Security+™: Review Guide, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.