From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Deception technologies
From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Deception technologies
- [Instructor] Cybersecurity analysts play a cat and mouse game with attackers, seeking to prevent them from gaining unauthorized access to a network. Deception technologies can be a powerful tool in this battle, allowing analysts to stay one step ahead of attackers. Let's take a look at a few common deception technologies. Analysts use a wide variety of security monitoring systems to detect unauthorized activity on networks, systems, and applications. However, it can often be difficult to tell the difference between legitimate traffic and activity that is part of an attack. Darknets are designed to assist with making this distinction. Administrators may set aside portions of their normal IP address space for use as a darknet. No legitimate systems use those addresses. Therefore, if a monitoring system detects any activity headed to those addresses, it's very likely that it is an attacker performing network…
Contents
-
-
-
-
-
-
Restricting network access2m 8s
-
Network access control4m 30s
-
Firewall rule management4m 9s
-
Router configuration security4m 5s
-
Switch configuration security3m 42s
-
Maintaining network availability2m 34s
-
Network monitoring3m 41s
-
SNMP2m 54s
-
Isolating sensitive systems1m 58s
-
Deception technologies2m 51s
-
-
-
-
-
-
-