10/21/24
CHAPTER 2
2.0 NETWORK HARDWARE 2.1 NETWORKING DEVICES 2.2 PHYSICAL ACCESS CONTROLS AND SECURITY 2.3 PHYSICAL PORTS AND WIRED CONNECTIONS
2.4 DISASTER RECOVERY AND REDUNDANCY (PHYSICAL)
85
CHAPTER 3 3.0 NETWORK SOFTWARE 3.1 PROTOCOLS AND COMMUNICATIONS 3.2 FIREWALLS 3.3 PASSWORD PROTECTION AND LOGINS 3.4 MULTI-LAYERED PROTECTION 3.5 ENCRYPTION – TRANSMISSION AND STORAGE 3.6 EXTERNAL CONNECTIONS 3.7 ANTIVIRUS AND MALWARE PROTECTION PROGRAMS
3.8 SOFTWARE UPDATES AND PATCHES 3.9 DISASTER RECOVERY (LOGICAL) 3.10 INTRUSION DETECTION AND PREVENTION 41 3.11VULNERABILITY SCANNING 3.12 LOGGING 3.13 REMOTE ACCESS ...
86
43
Made with FlippingBook - Online catalogs