1.2 Compare security deployments
đŸ“˜Cisco Certified CyberOps Associate (200-201 CBROPS v1.2, 2025 Update)
In cybersecurity, organizations use multiple layers of security to protect their IT environment. These layers can be grouped into three main types:
- Network Security
- Endpoint Security
- Application Security
Each of these plays a different role in keeping systems, data, and users safe.
1. Network Security Systems
Definition:
Network security systems protect the data moving across an organization’s network and prevent unauthorized access or attacks.
Key Components:
- Firewalls
- Function: Control incoming and outgoing network traffic.
- Example in IT Environment: A firewall blocks suspicious traffic from the internet trying to reach the company’s servers.
- Intrusion Detection and Prevention Systems (IDS/IPS)
- Function: Detect malicious activity or policy violations. IDS alerts security teams; IPS can automatically block the attack.
- Example: Detecting a hacker scanning network ports and blocking their IP automatically.
- Virtual Private Networks (VPNs)
- Function: Encrypt data between remote users and the network.
- Example: Employees working from home securely access company files via a VPN.
- Network Access Control (NAC)
- Function: Ensures only authorized devices and users can connect to the network.
- Example: A new laptop trying to join the company network is checked for antivirus and proper configuration before it can connect.
- Security Information and Event Management (SIEM)
- Function: Collects, analyzes, and reports on network events and security alerts.
- Example: SIEM aggregates logs from firewalls and servers to detect patterns like repeated failed login attempts.
Purpose for Exam:
You need to understand that network security focuses on protecting data in motion, stopping intruders, and monitoring network traffic.
2. Endpoint Security Systems
Definition:
Endpoint security protects individual devices that connect to the network, like laptops, desktops, servers, and mobile devices.
Key Components:
- Antivirus / Anti-Malware
- Function: Detects and removes malicious software.
- Example: A malware-infected USB drive is detected when plugged into a workstation.
- Endpoint Detection and Response (EDR)
- Function: Monitors endpoints in real-time for suspicious activity. Can respond automatically or alert security teams.
- Example: Detecting unusual file changes on an employee’s laptop and isolating it from the network.
- Host-Based Firewalls
- Function: Filters traffic specifically for that device.
- Example: A laptop’s firewall blocks unauthorized remote connections.
- Data Loss Prevention (DLP)
- Function: Prevents sensitive data from leaving the endpoint.
- Example: Stopping confidential documents from being emailed to personal accounts.
Purpose for Exam:
Endpoint security focuses on protecting devices themselves and stopping threats that might bypass network security.
3. Application Security Systems
Definition:
Application security protects software applications from vulnerabilities and attacks during use.
Key Components:
- Web Application Firewalls (WAFs)
- Function: Protect web applications from attacks like SQL injection, cross-site scripting (XSS).
- Example: Preventing an attacker from sending harmful queries to a web-based customer portal.
- Patch Management
- Function: Keeps software updated with the latest security fixes.
- Example: Updating a server’s database software to fix a known vulnerability.
- Application Control / Whitelisting
- Function: Allows only authorized applications to run.
- Example: A company allows only its approved accounting software on employee laptops.
- Runtime Application Self-Protection (RASP)
- Function: Monitors applications in real-time for attacks while running.
- Example: Detecting and blocking malicious input before it affects the application.
Purpose for Exam:
Application security focuses on protecting the software itself from attacks, ensuring the data and functionality are safe.
Key Differences in a Simple Table
| Feature | Network Security | Endpoint Security | Application Security |
|---|---|---|---|
| Focus | Protect data in motion | Protect devices | Protect software/applications |
| Examples | Firewalls, IDS/IPS, VPNs | Antivirus, EDR, DLP | WAF, Patch Management, RASP |
| Primary Goal | Block intruders, monitor traffic | Detect and respond to malware or attacks on devices | Prevent software vulnerabilities from being exploited |
Why It Matters
- Network, endpoint, and application security work together to provide a layered defense (defense in depth).
- Understanding these layers helps security teams detect, respond, and prevent attacks effectively.
- For the CBROPS exam, you need to know what each type protects, the key tools, and how they are deployed.
✅ Exam Tip:
Remember the three layers like this:
- Network = Data moving
- Endpoint = Devices
- Application = Software
This simple mental model often helps in multiple-choice questions.
