Microsoft

Real Microsoft 70-462 Exam Questions-70-462 Exam Prep:

70-462

70-462 exam questions Transformation of the Security Paradigm
As the size of networks continues 70-462 exam 70-462 exam pdf to grow and attacks to those networks become increasingly sophisticated, the way we think about security is changing. Here are some of the major factors that are changing the security paradigm:
.
Security is no longer about “products”: Security solutions must be chosen with business objectives in mind and integrated with operational procedures and tools.

.
Scalability demands are increasing: With the increasing number of vulnerabilities and security threats, solutions must scale to thousands of hosts in large enterprises.

.
Legacy endpoint security Total Cost of Ownership (TCO) is a challenge:

Reactive products force deployment and renewal of multiple agents and management paradigms.
. Day zero damage: Rapidly propagating attacks (Slammer, Nimda, MyDoom) happen too fast for reactive products to control. Therefore, an automated, proactive
Chapter 1. Overview of Network Security
Network Security Technologies and Solutions (CCIE Professional Development Series) By
Yusuf Bhaiji – CCIE No. 9305 ISBN: 9780768681963 Publisher: Cisco Press
Print Publication Date: 2008/02/09 User number: 999108 Copyright 2008, Safari Books Online, LLC.
This PDF is exclusively for your use in accordance with the Safari Terms of Service. No part of it may be reproduced or transmitted in any form by any means without the prior written permission for reprints and excerpts from the publisher. Redistribution or other use that violates the fair use priviledge under U.S. copyright laws (see 17 USC107) or that otherwise violates the Safari Terms of Service is strictly prohibited.
Chapter 1. Overview of Network Security Page 4 Return to Table of Contents
security system is needed to combat the dynamic array of modern-day viruses and
worms.
With modern-day distributed networks, security cannot be enforced only at the network edge or perimeter. We will discuss perimeter security more in detail later in this chapter.
Zero-day attacks or new and unknown viruses continue to plague enterprises and service provider networks.
To attempt to establish protection against attacks, enterprises try to patch systems as vulnerabilities become known. This clearly cannot scale in large networks, and this situation can be addressed only with real-time proactive-based systems.
Security now is about management and reduction of risk in a rapidly evolving environment. Maximum risk reduction is achieved with an integrated solution built on a flexible and intelligent infrastructure and effective operations and management tools. Business objectives should drive security decisions. Today, we are in the new era that forces us to rethink security and outbreak prevention.

Principles of Security—The CIA Model
A simple but widely applicable security model is the confidentiality, integrity, and availability (CIA) triad. These three key principles should guide all secure systems. CIA also provides a measurement tool for security implementations. These principles are applicable across the entire spectrum of security analysis—from access, to a user’s Internet history, to the security of encrypted data across the Internet. A breach of any of these three principles can have serious consequences for all parties concerned.
Chapter 1. Overview of Network Security
Network Security Technologies and Solutions (CCIE Professional Development Series) By
Yusuf Bhaiji – CCIE No. 9305 ISBN: 9780768681963 Publisher: Cisco Press
Print Publication Date: 2008/02/09 User number: 999108 Copyright 2008, Safari Books Online, LLC.
This PDF is exclusively for your use in accordance with the Safari Terms of Service. No part of it may be reproduced or transmitted in any form by any means without the prior written permission for reprints and excerpts from the publisher. Redistribution or other use that violates the fair use priviledge under U.S. copyright laws (see 17 USC107) or that otherwise violates the Safari Terms of Service is strictly prohibited.
Chapter 1. Overview of Network Security Page 5 Return to Table of Contents

Confidentiality
Confidentiality prevents unauthorized disclosure of sensitive information. It is the capability to ensure that the necessary level of secrecy is enforced and that information is concealed from unauthorized users. When it comes to security, confidentiality is perhaps the most obvious aspect of the CIA triad, and it is the aspect of security most often attacked. Cryptography and encryption methods are examples of attempts to ensure the confidentiality of data transferred from one computer to another. For example, when performing an online banking transaction, the user wants to protect the privacy of the account details, such as passwords and card numbers. Cryptography provides a secure transmission protecting the sensitive data traversing across the shared medium.

Integrity
Integrity prevents unauthorized modification of data, systems, and information, thereby providing assurance of the accuracy of information and systems. If your data has integrity, you can be sure that your data is an accurate and unchanged representation of the original secure information. A common type of a security attack is man-in-the-middle. In this type of attack, an intruder intercepts data in transfer and makes changes to it.

Availability
Availability is the prevention of loss of access to resources and information to ensure that information is available for use when it is needed. It is imperative to make sure that information requested is readily accessible to the authorized users at all times. Denial of service (DoS) is one of several types of security attacks that attempts to deny access to the appropriate user, often for the sake of disruption of service.
Chapter 1. Overview of Network Security
Network Security Technologies and Solutions (CCIE Professional Development Series) By
Yusuf Bhaiji – CCIE No. 9305 ISBN: 9780768681963 Publisher: Cisco Press
Print Publication Date: 2008/02/09 User number: 999108 Copyright 2008, Safari Books Online, LLC.
This PDF is exclusively for your 70-462 exam dumps 70-462 exam questions pdf use in accordance with the Safari Terms of Service. No part of it may be reproduced or transmitted in any form by any means without the prior written permission for reprints and excerpts from the publisher. Redistribution or other use that violates the fair use priviledge under U.S. copyright laws (see 17 USC107) or that otherwise violates the Safari Terms of Service is strictly prohibited.
Chapter 1. Overview of Network Security Page 6 Return to Table of Contents

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s