From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Comparing security deployments

Comparing security deployments

From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts

Start my 1-month free trial

Comparing security deployments

- [Instructor] While no defense method is totally threat proof, good practices will help hamper a potential attack. Most experts generally suggest using a layered approach that includes network, endpoint, and application security systems. Defense methods include a combination of logical and physical security, security appliances along with policies that outline proper behavior. Logical security includes access control techniques that ensure authentication, authorization and accounting in an information system. Physical security methods limit access to buildings and equipment by using physical controls, such as locks, lighting, gates and smart cards. Security appliances include intrusion detection, intrusion prevention systems, gateways, and firewalls that are tuned to allow or deny traffic based on a set of rules. And policies define a set of rules of conduct for anyone or anything that interacts with system resources.…

Contents