ABSTRACT

Understand the differences between traditional and modern computing ◾ environments. Describe some internal controls that should be implemented in your secu-◾ rity architecture. Describe some external controls that should be implemented in your secu-◾ rity architecture. Understand the different types of cables and specifications of each used ◾ in telecommunications. Describe the differences between the different types of dedicated lines. ◾ Understand some of the security controls surrounding telecommunications. ◾ Understand the security controls and risks involved in Voice over IP ◾ (VoIP) solutions. Understand the benefits of a Virtual Private Network (VPN). ◾ Understand the risks and security controls around wireless access solutions. ◾ Describe the importance of Web filtering and list sites that should be filtered. ◾

9.1 Security Architecture Computing environments have been described in terms of two broad categories: traditional and modern. Figure 9.1 illustrates an example of the differences between

these two computing environments. The traditional computing environment is considered easier to secure than the modern computer environment. This is because the modern computing environment contains multiple security threats. These threats come in the form of the number of nodes that are in place where the traffic flows. In a traditional computing environment, there was a hierarchy of information flowusually in a vertical, top to bottom approach. In the modern computing environment, information is laid out in a more horizontal method and multiple hubs, switches, and routers are utilized to forward the information to where it needs to go. There is an inherent security threat in this method when information can be viewed at any point along the path along which it flows.