[Unlocked] • Perimeter Security •

[Unlocked] • Perimeter Security •

Chapter 10

Router

Sandboxing

Servers

Web security gateway

•Wireless access point

•Workstation

Network Access Protection (NAP)

•Network Admission Control (NAC)

Basic packet filtering

•Bridge

Chapter 11

Attribute-based access control (ABAC)

•Authentication

•Authentication Header (AH)

•Authentication server (AS)

•Authorization

•Content protection

•Context protection

•Discretionary access control (DAC)

Remote access server (RAS)

•Virtual private network (VPN)

Chapter 12

Jailbreaking

•MAC filtering

•MIMO

•Mobile device management (MDM)

•Near field communication (NFC)

•Orthogonal frequency division multiplexing (OFDM)

•RC4 stream cipher

•Remote wiping

•Rogue access poin

Chapter 13

Network-based IDS (NIDS)

•Perimeter security

•Port mirroring

•Protocol analyzer

•Signature database

•Snort

•Suricata

•Switched Port Analyzer (SPAN)

•Traffic collector

•User interface and reporting