DevNet Associate DEVASC 200-901 Official Certification Guide by Adrian Iliesiu (z-lib.org)

(andrew) #1
Access: Use various methods to try to hack the application, such
as testing the app for SQL injection, back doors, traffic
interception, and so on. Long-term access testing looks at the kinds
of vulnerabilities exposed when a system is exploited for a long
time.
Reporting: Include all details on the vulnerabilities and sensitive data
exposed, as well as the amount of time the system remained unhacked.

Securing Network Devices


Network devices are the components of a network that
transport communications needed for data, applications,
services, and multimedia. These devices include routers,
firewalls, switches, servers, load balancers, intrusion
detection systems, Domain Name System servers, and
storage area networks. These devices are ideal targets for
malicious actors because most or all organizational and
customer traffic must pass through them.


Firewalls


A firewall is a barrier that’s put in place to limit damage.
A firewall can be either hardware or software that’s
installed to limit damage from external and internal
cyberattacks. It monitors and controls network traffic
based on a set of security rules. Figure 14-7 shows how
firewalls can monitor and control network traffic as it
flows between a local-area network (LAN) and the
Internet (WAN).

Free download pdf