From the course: Cert Prep: ISC2 Certified in Cybersecurity (CC)
Unlock this course with a free trial
Join today to access over 22,700 courses taught by industry experts.
Security zones
From the course: Cert Prep: ISC2 Certified in Cybersecurity (CC)
Security zones
- Well-designed networks use firewalls to group systems into network segments based upon their security level. Let's talk about some of the more common security zones, and we're going to begin with the network border firewall. Typical border firewalls have three network interfaces because they connect three different security zones together. One interface connects to the internet or another untrusted network. This is the interface between the protected networks and the outside world. Generally speaking, firewalls allow many different kinds of connections out to this network when initiated by a system on more trusted networks, but they block most inbound connection attempts, allowing only those that meet the organization's security policy. A second network interface connects to the organization's intranet. This is the internal network where most systems reside. This intranet zone may be further subdivided into segments for…
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Data center protection5m 16s
-
(Locked)
Security zones3m 54s
-
(Locked)
Routers and switches2m 56s
-
(Locked)
VLANs and network segmentation2m 19s
-
(Locked)
Firewalls6m 20s
-
(Locked)
VPNs and VPN concentrators4m 41s
-
(Locked)
Network access control4m 36s
-
(Locked)
Internet of Things3m 5s
-
(Locked)
Securing IoT devices3m 8s
-
(Locked)
Network security for smart devices1m 58s
-
(Locked)
-
-
-
-