Part of the CompTIA Network+ Study Guide
🔐 CIA Triad
-
Confidentiality: Ensures only authorized users can
access sensitive information using techniques like encryption and
access controls.
-
Integrity: Guarantees data has not been altered or
tampered with, validated through hashing and digital signatures.
-
Availability: Ensures systems and data are
accessible when needed, maintained with failovers, backups, and DDoS
protections.
Visit CISA to learn more.
🛠️ Network Hardening
-
Disable unnecessary services and ports to reduce attack surfaces.
-
Apply patches and firmware updates regularly to fix known
vulnerabilities.
-
Use strong passwords and multi-factor authentication across all
access points.
-
Enforce configuration baselines for network and security devices.
- Physically secure network hardware from unauthorized access.
NIST Cybersecurity Framework
🌐 Remote Access
-
VPN: Encrypts traffic over the internet to secure
remote communications.
-
RDP: Provides graphical access to remote computers;
must be restricted and encrypted.
-
Authentication: Secure login methods such as MFA
reduce the risk of credential-based attacks.
Cisco's VPN Overview
🏢 Physical Security
-
Badge Readers: Grant access based on identity cards
or tokens.
-
Locks and Cabinets: Prevent physical tampering or
theft of hardware.
-
Surveillance: Monitor and record activities for
accountability and deterrence.
-
Visitor Policies: Log and restrict access for
guests to sensitive areas.
SANS Physical Security Guide