Understanding the impact of data visibility through networking technologies
In this section, you will learn how networking technologies and various IP services can affect data visibility. As traffic is transported between one device and another, there are many network protocols that help to deliver a message from a source to a destination. Some of these technologies modify the contents of the original message that was created by the sender and, due to the change of content, such as source IP address or even using encryption, can create a challenge for security professionals to determine the true source and destination, as well as the actual data that is being transported through the network.
Access control lists
Routers are used to interconnect two or more different networks. Cisco routers do not just move packets from one network to another; they allow a network security engineer to implement special rules known as access control lists (ACLs). ACLs are used to filter traffic...