This chapter provided an overview of basic security concepts and controls that can be used by administrators to secure physical devices and media. One of the most important topics, controlling who can access the network and how, was further expanded.
Demilitarized zone (DMZ)
Intrusion detection system (IDS)
Network address translation (NAT)
Public branch exchange (PBX)
Public switched telephone network (PSTN)
Remote monitoring (RMON)
Shielded twisted pair (STP)
Simple Network Management Protocol (SNMP)
Unshielded twisted pair (UTP)
Virtual local area network (VLAN)
Firewalls are the focal points of overall network access policy. Several types of ...