Chapter 2. Introduction to Network Security

[ LiB ]  

Terms you'll need to understand:

  • Denial of service (DoS)

  • Distributed denial of service (DDoS)

  • Reconnaissance attacks

  • Access attacks

  • Internal threats

  • External threats

  • Unstructured threats

  • Structured threats

Techniques you'll need to master:

  • Determining specific network security needs

  • Creating a security policy

  • Classifying types of attacks (attack taxonomy)

  • Using management protocols and functions

  • Using the Cisco Security Wheel

Today's networks are increasingly interconnected , reflecting the evolving business organizations that depend on them. This interconnectivity and complexity expose networks to threats and attacks that can cause temporary minor disruptions in productivity or cripple business operations for an unacceptable length of time.

This chapter provides you with an understanding of the types of threats your network faces today and how those threats are developing. You learn about network vulnerabilities and the tools and techniques that hackers employ to exploit these weaknesses. An explanation follows of how you use the four stages of the Cisco Security Wheel to maintain and update the ever-evolving enterprise security policy.

[ LiB ]  

CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
Year: 2004
Pages: 213 © 2008-2017.
If you may any questions please contact us: