Goals and Methods


The primary objective of this book is to provide you with the following:

  • An understanding of network and host security

  • The risk involved with deploying your network on the Internet

  • Step-by-step instructions on how to mitigate Internet security risks

The key mitigation technique or methodology used in this book is a structured approach to security called defense in depth. Defense in depth is a method using several layers of network and host defenses to protect your infrastructure. These security layers are deployed using ASDM and the ASA/PIX Security Appliance. However, because a security appliance alone can't protect against all network attacks, CSA host intrusion prevention software is recommended as a mandatory security deployment. CSA is capable of stopping any attacks launched against a Microsoft Windows (and some Solaris and Linux) host or server environment connected to the Internet.



Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors: Greg Abelar

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net