Slutsåld
Bob Vachon is a professor in the Computer Systems Technology program at Cambrian College in Sudbury, Ontario, Canada, where he teaches networking infrastructure courses. He has worked and taught in the computer networking and information technology field since 1984. He has collaborated on various CCNA, CCNA Security, and CCNP projects for the Cisco Networking Academy as team lead, lead author, and subject matter expert. He enjoys playing the guitar and being outdoors.
Introduction xxi
Part I: Networking Security Fundamentals
Chapter 1 Networking Security Concepts 1
Basic Security Concepts 2
Security Terminology 2
Confidentiality, Integrity, and Availability (CIA) 2
Data Classification Criteria 2
Data Classification Levels 3
Classification Roles 3
Threat Classification 3
Trends in Information Security Threats 4
Preventive, Detective, and Corrective Controls 4
Risk Avoidance, Transfer, and Retention 4
Drivers for Network Security 5
Evolution of Threats 5
Data Loss and Exfiltration 5
Tracking Threats 6
Malware 6
Anatomy of a Worm 7
Mitigating Malware and Worms 7
Threats in Borderless Networks 8
Hacker Titles 8
Thinking Like a Hacker 9
Reconnaissance Attacks 9
Access Attacks 10
Password Cracking 11
Denial-of-Service Attacks 11
Distributed Denial-of-Service Attacks 12
Tools Used by Attackers 13
Principles of Secure Network Design 13
Defense in Depth 14
Chapter 2 Implementing Security Policies 15
Managing Risk 15
Quantitative Risk Analysis Formula 16
Quantitative Risk Analysis Example 17
Regulatory Compliance 17
Security Policy 19
Standards, Guidelines, and Procedures 20
Security Policy Audience Responsibilities 21
Security Awareness 21
Secure Network Lifecycle Management 22
Models and Frameworks 23
Assessing and Monitoring the Network Security Posture 23
Testing the Security Architecture 24
Incident Response 24
Incident Response Phases 24
Computer Crime Investigation 25
Collection of Evidence and Forensics 25
Law Enforcement and Liability 25
Ethics 25
Disaster-Recovery and Business-Continuity Planning 26
Chapter 3 Building a Security Strategy 27
Cisco Borderless Network Architecture 27
Borderless Security Products 28
Cisco SecureX Architec...