About this page.

This blog was originally just going to be my Security assignment for electronic logs, but it has now evolved just a bit. In this blog will will find my notes and anything else we do in these classes.

Saturday, March 3, 2012

Chapter 7 Notes


Administering a Secure Network

Objectives
¨  List and describe the functions of common network protocols
¨  Explain how network administration principles can be applied
¨  Define the new types of network applications and how they can be secured

Common Network Protocols
¨  Protocols
¡  Rules of conduct and communication
¡  Essential for proper communication between network devices
¨  Transmission Control Protocol/Internet Protocol (TCP/IP)
¡  Most common protocol suite used for local area networks and the Internet
¨  IP
¡  Protocol that functions primarily at Open Systems Interconnection (OSI) Network Layer (Layer 3)
¨  TCP
¡  Transport Layer (Layer 4) protocol
¡  Establishes connections and reliable data transport between devices
¨  TCP/IP uses a four layer architecture
¡  Network Interface, Internet, Transport, Application
More after the Break

Friday, March 2, 2012

Chapter 6


Network Security

Objectives
¨  List the different types of network security devices and explain how they can be used
¨  Define network address translation and network access control
¨  Explain how to enhance security through network design

Security Through Network Devices
¨  Not all applications designed, written with security in mind
¡  Network must provide protection
¨  Networks with weak security invite attackers
¨  Aspects of building a secure network
¡  Network devices
¡  Network technologies
¡  Design of the network itself
More after the break

Thursday, March 1, 2012

Chapter 5 Notes

From here on out I am transcribing the power points that Jerry provides.  He's teaching directly off of them.



Host, Application, and Data Security


Objectives
¨  List the steps for securing a host computer
¨  Define application security
¨  Explain how to secure data using loss prevention


Securing the Host
¨  Three important elements to secure
¡  Host (network server or client)
¡  Applications
¡  Data
¨  Securing the host involves:
¡  Protecting the physical device
¡  Securing the operating system software
¡  Using security-based software applications
¡  Monitoring logs
More after the break