Comptia Security Plus ISO Model

Comptia Security Plus ISO Model, TCTIP Model, Hybird Model

OSI Layer

 

Layer OSI TCPIP HYBIRD
7 Application Application Application
6 Presentation Application Application
5 Session Application Application
4 Transport Transport Transport
3 Network Network Network
2 Data Link Network Access Data Link
1 Physical Network Access Physical

 

A switch operates at Layer 2, the switch can also be used to manage port security.

Router is a layer 3 device, a router makes forwarding decision based on layer 3 (network) IP Addresses. We can add access control lists to allow or disallow network traffic.

 

A firewall is also a layer 3 device. A firewall does stateful inspection of network traffic. This means a firewall will remember various types of network traffic such-as IP Address or network ports. A firewall may also look at layers above layer 3 such as application traffic.

 

Load balancing refers to the process of distributing a set of tasks over a set of resources, with the aim of making their overall processing more efficient. Load balancing can optimize the response time and avoid unevenly overloading some compute nodes while other compute nodes are left idle.

Network-based intrusion detection systems (NIDS) are devices intelligently distributed on the networks that passively inspect network traffic. NIDS monitors the netowrk but will not stop malware.

A Network intrusion prevention system (NIPS) is a network security device that monitors for and prevents identified threats. Intrusion prevention systems continuously monitor the network and blocks threats such as Ransomware. NIPS are built in to next generation firewalls. NIPS use behavior and signitures to identify and block malware.




Cyber Security Structure Attacks | Unstructured Attacks

The cyber attacks can also be classified as structure attacks and unstructured attacks based on the level of maturity of the attacker

How does ARP work? | ARP Commands

How does ARP work?, ARP Command

Classification of Cyber Crimes | Cyber Attacks

The cyber criminal could be internal or external to the organization facing the cyber attack

Comptia Security Plus ISO Model

Comptia Security Plus ISO Model, TCTIP Model, Hybird Model

Comptia Security Plus | Network Traffic Analysis

Comptia Security Plus | Network Traffic Analysis

Understanding Ransomware | Defending Against Ransomware

Understanding Ransomware and Defending Against Ransomware

Types of Cyber Security Threats

Types of Cyber Security Threats: Ransomware, Malware, Social engineering, Phishing

Reasons for Cyber Crime | Cyber Crime Security

There are many reasons which act as a catalyst in the growth of cyber crime.

Kaseya Cyber Attack | Kaseya Ransomware Attack

About 200 US businesses have been hit by ransomware attack, according to a cyber-security firm.

Suggested Cyber Resilience Activity Plan

Suggested Cyber Resilience Activity Plan