Understanding Problems Affecting Device Security
Throughout this whole chapter, I’ve been going on and on about the myriad devices we use to secure traffic coming into our networks and devices and the things we depend on to detect and prevent attacks on them. It’s an important subject and one that you must solidly understand in order to be effective in networking. Knowing how to implement a tight security program requires working knowledge of these devices, but it doesn’t end there because there’s always more you can know.
There happen to be a few more really significant and valuable concepts you should have a good grasp of when setting up and managing the security on your network. So that’s the direction in which we’re going to head for the remainder of this chapter—we’ll cover key issues you need to be aware of, including physical security and corresponding logical security structures, and restricting access.