TAILIEUCHUNG - Cisco Security Setup & Configuration: Part 1 – a Layered Approach

Perform regularly scheduled tests of your new system. Such tests should be performed by both internal and external parties. You may chose to perform quarterly or bi-annual internal tests and annual audits by an external entity. Of course, no system is perfect, so expect to have areas for improvement discovered as a result of these tests. These areas of improvement lead us to the final step in the security lifecycle. | Global Knowledge Expert Reference Series ofWhite Papers Cisco Security Setup Configuration Part 1 a Layered Approach 1-800-COURSES Cisco Security Setup Configuration Part 1 a Layered Approach Isaac A. Valdez Global Knowledge Instructor CCSI CCSP CCNP CCDP Introduction This paper is the first in a three-part series of white papers each of which focuses on a functional area of securing your network. The three papers work together to create a complete picture of how to configure your network appliances for complete corporate security. It will discuss a starting point for network security suggested technology types ideal points for securing your network using a layered approach and secure ways to manage your new or existing network. This first paper in the series introduces concepts to get started on network security and begin the process of securing your network at the switch level. Security Policy Start at the Beginning Security is one of the fastest growing branches within the networking industry and current trends point to a steady increase in growth over the years to come. This is largely due to the integration of so many critical data types over a single network and the increased realization by companies as to just how vulnerable their networks can be. With security becoming such a focal point of networks it is increasingly important to understand how to integrate security into a network. As with any new project you must start with some direction. I m sure you have heard the adage If you fail to plan then you plan to fail. This is never more true than when planning network security. Create your security policy to serve as a starting point and future road map for securing your corporation. A security policy originally defined in request for comment RFC 2196 and now updated in RFC 3704 contains the whys whats and hows of securing your corporate environment. Copyright 2006 Global Knowledge Training LLC. All rights reserved. 2 Why have a .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.