Reply To: OCU C)OST C Discussion Lesson 09
Firewall Appliance: Monitors and filters incoming and outgoing network traffic. It provides a first line of defense against unauthorized access and cyberattacks by blocking suspicious traffic at the network perimeter. Next we have is Network Access Control. Its purpose is to restrict unauthorized devices from connecting to the business network. They enforce security policies by ensuring only approved and secure devices gain access, reducing the risk of internal threats or even infected devices. Last is Surveillance Cameras or IP cameras. their purpose is to physically monitor network infrastructure like server rooms and data centers. It basically deters physical tampering or theft of networking equipment and provides video evidence in case of security incidents. At least with IP cameras, you are able to have real time remote monitoring allowing you to monitor business operations even offsite. If you want to go through the Mission impassible route, using security Alarms and motion sensors can be another way as well. They trigger alerts when unauthorized movement is detected near sensitive equipment. Hope this information helps!