Information Technology Reference
In-Depth Information
Objective
Corresponding Topic Chapter
5.0 Security
5.1 Explain network security concepts, tools, and best
practices.
Chapter 11
ACLs
■
VPNs
■
IDS/IPS hardware/software-based firewalls
■
DMZ
■
Review / audit logs
■
Attacks
■
■
DDoS
Ping of death
■
Ping flood
■
5.2 Explain storage security concepts, methods,
and best practices.
Chapter 11
Obfuscation
■
Access Control Lists
■
Zoning
■
LUN masking
■
User and host authentication
■
Review/audit logs
■
5.3 Compare and contrast different encryption technologies
and methods.
Chapter 11
PKI
■
IPSEC
■
SSL/TLS
■
Ciphers
■
■
AES
3DES
■
RSA
■
DSA
■
RC4
■
RC5
■
Encryption for data in transit and encryption for data
at rest
■
Search WWH ::
Custom Search