Access Control # Access control describes the mechanisms used to filter network traffic to determine who is and who is not allowed to access the network and network resources.
Access Control Lists # Access-control list Mandatory Access Control # 20220315174137-mandatory-access-control Discretionary Access Control # Sources # Wikipedia - Access control
Applications and tools to control the look of the data. Includes API s.
Address Resolution Protocol
arp -a shows the IP address-to-MAC address mapping table
Authentication Authorization and Accounting # (AAA)
Solves many of the issues with PPP .
Is designed for the idea of port authentication. Allowing remote users authentication to a particular point of entry (a port) to another network.
Authentication : authenticate with any type of authentication method, usually username and password.
Authorization : once authenticated determine what it has access to.
...
A change request is a document containing a call for an adjustment of a system; it is of great importance in the change management process .
Wikipedia - Change request See also # Change Control
Video link to review before the test.
Network Models Cabling and Topology Ethernet Basics Modern Ethernet Installing a Physical Network TCP/IP Basics Routing TCP/IP Applications Network Naming Securing TCP/IP Advanced Networking Devices IPv6
Remote Connectivity
...
Content-addressable memory (CAM) is a special type of computer memory used in certain very-high-speed searching applications.
Used in networking devices where it speeds up forwarding information base and routing table operations. Much faster than RAM in data search operations Source: https://en.wikipedia.org/wiki/Content-addressable_memory
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking . This layer is the protocol layer that transfers data between nodes on a network segment across the physical layer .
Delivers frames between nodes on the same level of the network. Doesn’t cross boundaries of LAN . Inter-network routing and global addressing are higher-layer functions. Source: https://en.
...
Data loss prevention (DLP) software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use (endpoint actions), in motion (network traffic), and at rest (data storage).
Source: https://en.wikipedia.org/wiki/Data_loss_prevention_software
Defense in Depth #