Summary
This chapter reinforced the core security concepts of confidentiality, integrity, availability, authenticity, and non-repudiation and how they come into play when securing communications channels. It emphasized the importance of securing various network elements, focusing on HA and fault tolerance, NAC, and endpoint security. You looked at the difference between HA and fault tolerance, and how they both aim to ensure network availability but differ in cost and implementation. Fault tolerance offers zero service interruption using redundant hardware, while HA uses a holistic approach combining hardware and software to restore services quickly after a failure, making it more cost-effective. The chapter also highlighted that power redundancy, warranties, and support are crucial in maintaining robust network architecture, with components such as UPSs providing backup during power outages.
You also looked at network security components, including transmission media, NAC devices...