Copyright Goodheart-Willcox Co., Inc. Chapter 2 Information Security Fundamentals 37 lock. To log in to the computer network, a fi ngerprint might be required. So, for an intruder to gain access to the network, he or she would need to: 1. Slip past the security guards 2. Know or hack the door-lock code and 3. Hack the fi ngerprint lock on the network. Another defense in depth best practice is to diversify equipment and ven- dors. For example, if you are using only Cisco routers and there is a vulnerability that is exploited by hackers, it would affect all of your routers. If you had a diver- sity of routers from different manufacturers, you would still have the ability to continue limited operations and not suffer a complete failure. This is known as systems resilience. In order to organize protection against cybersecurity threats, many compa- nies use frameworks. Frameworks help break down the aspects of a business and security domains into manageable task areas and tasks. In turn, this helps create plans and actions to defend against cyberthreats. The Center for Internet Security (CIS) provides controls for frameworks. These are just one example of a security framework that can be used as a baseline for an organization to develop their own specifi c documentation and security planning. Users The users domain is all about people. This domain includes the staff at the business. However, it could also include vendors or contractors who use the net- work. It also includes guests who have been provided Wi-Fi access. Users represent the weakest link in the security chain. They provide spe- cifi c vulnerabilities and threats. For example, users might reveal confi dential data, have weak passwords, leave confi dential papers on desks, or lose fl ash drives con- taining important data. It is critical to create a domain to deal with these issues. Simple measures such as proper trash disposal, not using sticky-notes on moni- tors, and locking computers when not near them can go far in securing systems. Another strategy is a screen saver that locks the computer so that unauthorized users cannot access the system. Workstation The workstation domain deals with the issues surrounding workstations or other devices used by people. Workstations are computers such as desktop or laptop units. Other devices include tablets, smartphones, and Internet of Things devices. What is the Internet of Things? Internet of Things (IoT) describes the connec- tion of nontraditional computing devices to the Internet, as shown in Figure 2-4. Computer technology is moving at a fast pace. Internet connectivity is being added to nontraditional devices such as home appliances, wearable devices, trash cans, lightbulbs, and much more! This phenomenon is the Internet of Things. LAN The local area network (LAN) is the network infrastructure within a small area. This area is usually a single building. Issues related to the LAN may be related to servers, switches, routers, and media. The LAN domain covers these issues. WAN A wide area network (WAN) is the network infrastructure for more than one geographic location. The Internet is an example of a WAN. There are dis- tinct threats and vulnerabilities that could occur in this part of the network infra- structure. The WAN domain covers these issues. Important considerations in this CompTIA Security+ 3.1 Zapp2Photo/Shutterstock.com Figure 2-4. The Internet of Things describes the connection of devices to the Internet.
Previous Page Next Page