Device Placement
- Proper placement of routers, switches, and access points is crucial
- Correct placement helps in:
- Optimal data flow
- Minimizing latency
- Enhancing security
- Routers at the network’s edge help filter traffic efficiently
- Strategic placement of access points ensures coverage and reduces interference
- Switches should be located for easy connection to network segments
Security Zones and Screened Subnets
- Security Zones — Isolate devices with similar security requirements
- Screened Subnets
- Act as buffer zones between internal and external networks
- Hosts public-facing services, protecting core internal networks
- Use the term “screened subnet” instead of “DMZ” for modern configurations
Attack Surface
- Refers to points where unauthorized access or data extraction can occur
- A larger attack surface increases the risk of vulnerabilities
- Identify and mitigate vulnerabilities to reduce the attack surface
- Regularly assess and minimize the attack surface for network security
Connectivity Methods
- Choose connectivity methods that influence network performance, reliability, and security
- Wired (e.g., Ethernet) offers stability and speed but restricts mobility
- Wireless (e.g., Wi-Fi) provides flexibility but may suffer from interference and security issues
- Consider factors like scalability, speed, security, and budget constraints when choosing connectivity methods
Device Attributes