Lesson 10-Infrastructure Security. Background. In the CIA of security, the “A” for availability is often overlooked. A failure allows unauthorized users to access resources and data. This compromises integrity or confidentiality.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Devices that connect end-user devices together to allow them to communicate.
Three main kinds:
VPN is an encrypted connection that appears dedicated.
Data is encrypted at both ends
Offers secure, reliable connectivity
A coax connector
A typical fiber optic fiber
Tunneling across a public network