[ LiB ] |
Terms you'll need to understand:
Denial of service (DoS)
Distributed denial of service (DDoS)
Reconnaissance attacks
Access attacks
Internal threats
External threats
Unstructured threats
Structured threats
Techniques you'll need to master:
Determining specific network security needs
Creating a security policy
Classifying types of attacks (attack taxonomy)
Using management protocols and functions
Using the Cisco Security Wheel
Today's networks are increasingly interconnected , reflecting the evolving business organizations that depend on them. This interconnectivity and complexity expose networks to threats and attacks that can cause temporary minor disruptions in productivity or cripple business operations for an unacceptable length of time.
This chapter provides you with an understanding of the types of threats your network faces today and how those threats are developing. You learn about network vulnerabilities and the tools and techniques that hackers employ to exploit these weaknesses. An explanation follows of how you use the four stages of the Cisco Security Wheel to maintain and update the ever-evolving enterprise security policy.
[ LiB ] |