Network Infrastructure Security, typically applied to enterprise IT environments, is a process of protecting the underlying networking infrastructure by installing preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data. These security measures can include access control, application security, firewalls, virtual private networks (VPN), behavioral analytics, intrusion prevention systems, and wireless security. Show
VMware NSX Data Center Datasheet
VMware NSX Network Detection and Response DatasheetNetwork Infrastructure Security requires a holistic approach of ongoing processes and practices to ensure that the underlying infrastructure remains protected. The Cybersecurity and Infrastructure Security Agency (CISA) recommends considering several approaches when addressing what methods to implement.
The greatest threat of network infrastructure security is from hackers and malicious applications that attack and attempt to gain control over the routing infrastructure. Network infrastructure components include all the devices needed for network communications, including routers, firewalls, switches, servers, load-balancers, intrusion detection systems (IDS), domain name system (DNS), and storage systems. Each of these systems presents an entry point to hackers who want to place malicious software on target networks.
Although there are any number of damaging attacks that hackers can inflict on a network, securing and defending the routing infrastructure should be of primary importance in preventing deep system infiltration. Network infrastructure security, when implemented well, provides several key benefits to a business’s network.
A variety of approaches to network infrastructure security exist, it is best to adhere to multiple approaches to broaden network defense.
What type of device is designed to filter and transfer data packets between this similar types of computer networks?A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. Data sent through the internet, such as a web page or email, is in the form of data packets.
Which device improves network performance by dividing a given network?By separating two or more LAN segments into multiple collision domains, the bridge reduces the number of collisions that could potentially occur on a LAN segment (fewer LAN speakers on the same segment), which improves network performance. The next evolution was the network switch.
Which security measure is in place when a client is denied access to the network due to outdated antivirus software?Which security measure is in place when a client is denied access to the network due to an outdated antivirus software? Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with.
What type of device would be the most convenient for interconnecting two or more physically separated network segments?Cards In This Set. |