Module 4 - Mindmap PDF
Module 4 - Mindmap PDF
Module 4 - Mindmap PDF
NAT VLAN
Act as negotiators for requests from client software
2 KINDS OF seeking resources from other servers. Use a sophisticated approach, while
Primary and simple type of network REMOTE PAT
PROXY SERVER security firewall. still retaining the basic abilities of
ACCESS
packet-filtering firewalls. server hides a network Groups of segmented
CONFIGURE SECURITY from outside users by hosts that do not
displaying a small
1. Open Proxy Server PROXY SERVER PARAMETERS ON NETWORK Allow network connection TELEPHONY
A more limited option require the network
2. Reverse Proxy form of NAT amount of IP addresses
administrator to
DEVICES AND TECHNOLOGIES via remote systems. for connected
relocate nodes or
computers.
rewire data links.
INTERNET The merger of telecommunications
PROTOCOL and networking resulted in telephony,
SECURITY or Voice over IP (VoIP).
sections of websites based solely on the URL. It restricts access WEB FILTER transmissions between critical servers
and clients. This helps prevent SIMPLE NETWORK
to specified websites and certain web-based applications. ANTIVIRUS network-based attacks from taking
place.
MANAGEMENT
MODULE 4: PROTOCOL
SECURE SHELL
LOAD BALANCING
Software that is designed to detect, protect
against, and remove malware on a computer.
IMPLEMENTING SNMP is an application layer protocol
whose purpose is to collect statistics
SECURITY
establishes a session between the
client and host computers using an
authenticated and encrypted
DIFFERENT WAYS connection. TRANSPORT
1. Round-robin NETWORK LOAD OF ANTIVIRUS DNS servers are organized in a
LAYER SECURITY
2. Affinity hierarchy. At the top level of the
BALANCER SPAM FILTER SOLUTIONS
3. Least Connection hierarchy, root servers store the
complete database of Internet domain
names and their corresponding IP
addresses A widely adopted security protocol
1. Based on the existing malware signatures designed to facilitate privacy and data
Physical units that direct computers to 2. Using heuristics security for communications over the
individual servers in a network based on factors Program used to detect unsolicited, unwanted 3. Based on file length PORTS Internet.
such as server processor utilization, number of and virus-infected emails and prevent those
connections to a server or overall server messages from getting to a user's inbox.
performance.
There are 65,535 TCP and UDP
Secure Copy Protocol (SCP) is a ports on which a computer can SECURE
Internet Small Computer System Interface (iSCSI) is an method based on (Secure Shell) communicate.
SOCKETS
IP-based storage networking standard for linking data INTERNET SMALL SECURE COPY SSH for safely transferring
computer files between a local LAYER
storage facilities. iSCSI is used for faster data transfers COMPUTER SYSTEM PROTOCOL
host and a remote host, or
over intranets and handling remote storage access INTERFACE between two remote hosts.
Secure Sockets Layer (SSL) protocol
mainly in local-area networks (LAN) and WANs.
communications occur between the
TRANSMISSION HTTP (application) and TCP (transport)
IMPLEMENTING CONTROL
layers of Internet communications.