438
Chapter 10
■
Physical Security Requirements
19.
What is the best type of water-based fire suppression system for a computer facility?
A.
Wet
pipe system
B.
Dry pipe system
C.
Preaction system
D.
Deluge system
20.
Which of the following is typically
not
a culprit in causing damage to computer equipment
in the event of a fire and a triggered suppression?
A.
Heat
B.
Suppression medium
C.
Smoke
D.
Light
Secure Network
Architecture and
Securing Network
Components
The CISSP exAm ToPICS Covered IN
ThIS ChAPTer INClude:
✓
Domain 4: Communication and Network Security
■
4.1 Implement secure design
principles in network
architectures
■
4.1.1 Open System Interconnection (OSI) and Transmis-
sion Control Protocol/Internet Protocol (TCP/IP) models
■
4.1.2 Internet Protocol (IP) networking
■
4.1.3 Implications of multilayer protocols
■
4.1.4 Converged protocols
■
4.1.5 Software-defined networks
■
4.1.6 Wireless networks
■
4.2 Secure network components
■
4.2.1
Operation of hardware
■
4.2.2 Transmission media
■
4.2.3 Network Access Control (NAC) devices
■
4.2.4 Endpoint security
■
4.2.5 Content-distribution networks
Chapter
11
Computers and networks emerge from the integration of
communication devices, storage devices, processing devices,
security devices, input devices,
output devices, operating
systems, software, services, data, and people. This chapter discusses the Open Systems
Interconnection (OSI) model as a guiding principle in networking, cabling, wireless con-
nectivity, Transmission Control Protocol/Internet Protocol (TCP/IP)
and related protocols,
networking devices, and firewalls.
The Communication and Network Security domain for the CISSP certification exam
deals with topics related to network components (i.e., network devices and protocols), spe-
cifically, how they function and how they are relevant to security. This domain is discussed
in this chapter and in Chapter 12, “Secure Communications and Network Attacks.” Be
sure to read and study the materials in both chapters to ensure complete coverage of the
essential material for the CISSP certification exam.
OSI Model
Communications between computers over networks are made possible by protocols. A
protocol
is a set of rules and restrictions that define how data is transmitted over a network
medium (e.g., twisted-pair cable, wireless transmission). In the early days of network devel-
opment, many companies had their
own proprietary protocols, which meant interaction
between computers of different vendors was often difficult, if not impossible. In an effort
to eliminate this problem, the
International Organization for Standardization (ISO)
devel-
oped the
Open Systems Interconnection (OSI) Reference Model
for protocols in the early
1980s.
Specifically, ISO 7498 defines the OSI Reference Model (more commonly called the
OSI model). Understanding the OSI model and how it relates to network design, deploy-
ment, and security is essential in preparing for the CISSP exam.
In order to properly implement secure design principles in network architectures, it is
important to fully understand all of the technologies involved in computer communica-
tions. From hardware and software to protocols
and encryption and beyond, there are lots
of details to know, standards to understand, and procedures to follow. Additionally, the
basis of secure network architecture and design is a thorough knowledge of the OSI and
TCP/IP models as well as Internet Protocol (IP) networking in general.