Автор: | Mike Chapple |
Издательство: | John Wiley & Sons Limited |
Серия: | |
Жанр произведения: | Зарубежная компьютерная литература |
Год издания: | 0 |
isbn: | 9781119786245 |
rel="nofollow" href="#u4e0f7ab7-fb94-5f54-8e09-9f33372e67f2">10
3.9.6
Utilities and Heating, Ventilation, and Air Conditioning (HVAC)
10
3.9.7
Environmental issues
10
3.9.8
Fire prevention, detection, and suppression
10
3.9.9
Power (e.g., redundant, backup)
10
Domain 4
Communication and Network Security
4.1
Assess and implement secure design principles in network architectures
11, 12
4.1.1
Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
11
4.1.2
Internet Protocol (IP) networking (e.g., Internet Protocol Security (IPSec), Internet Protocol (IP) v4/6)
11, 12
4.1.3
Secure protocols
11
4.1.4
Implications of multilayer protocols
11
4.1.5
Converged protocols (e.g., Fiber Channel Over Ethernet (FCoE), Internet Small Computer Systems Interface (iSCSI), Voice over Internet Protocol (VoIP))
11
4.1.6
Micro-segmentation (e.g., Software Defined Networks (SDN), Virtual eXtensible Local Area Network (VXLAN), Encapsulation, Software-Defined Wide Area Network (SD-WAN))
11
4.1.7
Wireless networks (e.g., LiFi, Wi-Fi, Zigbee, satellite)
11
4.1.8
Cellular networks (e.g., 4G, 5G)
11
4.1.9
Content Distribution Networks (CDN)
11
4.2
Secure network components
11
4.2.1
Operation of hardware (e.g., redundant power, warranty, support)
11
4.2.2
Transmission media
11
4.2.3
Network Access Control (NAC) devices
11
4.2.4
Endpoint security
11
4.3
Implement secure communication channels according to design
12
4.3.1
Voice
12
4.3.2
Multimedia collaboration
12
4.3.3
Remote access
12
4.3.4
Data communications
12
4.3.5
Virtualized networks
12
4.3.6
Third-party connectivity
12
Domain 5
Identity and Access Management (IAM)
5.1
Control physical and logical access to assets
13
5.1.1
Information
13
5.1.2