Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an exploration of the state-of-the-art and good practices in setting up a secure computer system. Concrete examples are offered in each chapter, to help the reader to master the concept and apply the security configuration. This book is intended for students preparing for the CCNA Security Exam (210-260 IINS) ? whether at professional training centers, technical faculties, or training centers associated with the ?Cisco Academy? program. It is also relevant to anyone interested in…mehr
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an exploration of the state-of-the-art and good practices in setting up a secure computer system. Concrete examples are offered in each chapter, to help the reader to master the concept and apply the security configuration.
This book is intended for students preparing for the CCNA Security Exam (210-260 IINS) ? whether at professional training centers, technical faculties, or training centers associated with the ?Cisco Academy? program. It is also relevant to anyone interested in computer security, be they professionals in this field or users who want to identify the threats and vulnerabilities of a network to ensure better security.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Ali Sadiqui is a trainer-researcher at the Office de la Formation Professionnelle et de la Promotion du Travail (OFPPT), Morocco. He is a member of several research laboratories and obtained his doctorate from the Sidi Mohamed Ben Abdellah University, Morocco.
Inhaltsangabe
Preface xi
Introduction xiii
Chapter 1. Fundamentals of Network Security 1
1.1. Introduction 1
1.1.1. The main objectives of securing a network 2
1.1.2. Information security terminology 2
1.2. Types of network security 4
1.2.1. Physical security 4
1.2.2. Logical security 4
1.2.3. Administrative security 5
1.3. The main risks related to the logical security of the network 5
1.3.1. Different kinds of network attacks 5
1.3.2. Network security measures 7
1.3.3. Vulnerability audit measures 8
1.4. Exercises to test learning 8
Chapter 2. Securing Network Devices 15
2.1. Types of network traffic 15
2.2. Securing the management plan 16
2.3. Securing passwords 16
2.4. Implementing connection restrictions 17
2.4.1. Configuring a login banner 17
2.4.2. Configuring connection parameters 17
2.5. Securing access through console lines, VTY and auxiliaries 18
2.5.1. Securing access through the console line and deactivating the auxiliary line 18
2.5.2. Securing VTY access with ssh 18
2.6. Allocation of administrative roles 19
2.6.1. Privilege levels of the IOS system 19
2.6.2. Configuring a privilege level 19
2.6.3. Setting a privilege level per user 20
2.6.4. Setting a privilege level for console, VTY, and auxiliary line access 20
2.6.5. Securing access with the management of "views" and "super-views" 21
2.6.6. Securing configuration files and the IOS system 22