DevNet Associate DEVASC 200-901 Official Certification Guide by Adrian Iliesiu (z-lib.org)
You cannot prevent the data from being altered by someone on the network, so the receiving element (destination) must be able to ...
Data Security Today, all our interactions with the world involve online systems in some way, and all these systems deal with dat ...
m o t i o n ( n e t w o r k ) use case of TLS is encrypting the communication between web applications and servers, such as web ...
D a t a i n u s e ( m e m o r y ) When a running application is processing data, the data is in memory (or in use). All open fil ...
ar e gu ar de d an d se cu re m e m or y se g m en ts Secure Development Methods As mentioned earlier in this chapter, the appli ...
Figure 14-6 Secure Development As you can see in the figure, the SDLC includes these steps: Training: Training helps get everyon ...
Encoding output Ensuring authentication and credential management Managing sessions Using access control lists Monitoring error ...
Access: Use various methods to try to hack the application, such as testing the app for SQL injection, back doors, traffic inter ...
Figure 14-7 Firewall The primary function of all firewalls is to screen network traffic and prevent unauthorized access between ...
Figure 14-8 Stateless Firewall (Packet Filtering) Stateful inspection firewalls: Packets are examined with other packets in the ...
Figure 14-9 Stateful Firewall (Context Aware) Application-level or proxy firewall: This type of firewall protects network resour ...
suspicious activity in real time; it has to let a few packets pass before it can initiate any action. An IDS usually has to rely ...
such as a router or switch. Like an IDS, an IPS does deep-packet inspection of packets; however, an IPS takes action immediately ...
Figure 14-12 shows how a client request gets to the DNS resolver, which in turn gets to the primary DNS server. Figure 14-12 DNS ...
level domain (TLD) servers and eventually authoritative servers, until results are achieved. Step 5. When the client has the IP ...
nslookup -type=any stanford.edu : The -type=any parameter allows us to get all the DNS records for that domain, including the ma ...
Figure 14-13 shows how requests coming in from various clients can be load balanced (or distributed) to various servers. Figure ...
Scalability and flexibility: Clients see only the reverse proxy’s IP address. This is particularly useful in a load-balanced env ...
Figure 14-14 Reverse Proxy Figure 14-15 illustrates the concept of a reverse proxy with a user requesting a web page from https: ...
Preparation," and the exam simulation questions on the companion website. REVIEW ALL KEY TOPICS Review the most important topics ...
«
32
33
34
35
36
37
38
39
40
41
»
Free download pdf