Information Technology Reference
In-Depth Information
Foundation Topics
This chapter examines security management topics that you need to master for the CCDA
exam. It begins by explaining the reasons for network security and some techniques that
can be used to prevent attacks. Next, the chapter describes the types of attacks that can
compromise network security and classifications of security threats. It goes on to cover
the risks inherent in network security, along with a series of risk examples that illustrate
how attacks can occur. The chapter then looks what a “security policy” is and how it is
used as a framework for network security.
In addition, this chapter explores ways to control and permit network access at any point
within the network and discusses enabling security in network equipment by using traf-
fic-isolation techniques. The chapter wraps up with examining some security management
solutions.
Network Security Overview
For many years, net works were desig ned to be fairly open in nature and did not require
much security. The greatest area of concern was physical access. Over time, networks grew
in size, and complexity increased the need for network security. For today's businesses and
organizations, security is now a mandatory part of designing IT systems, because the risks
are too high if critical data is lost or tampered with. Security teams within organizations
must now provide adequate levels of protection for the business to conduct its operations.
Network security is used to defend against network attacks and prevent unauthorized ac-
cess from intruders. In addition, network security protects data from manipulation and
theft. Businesses today also need to comply with company policy and security legislation
that is in place to help protect data and keep it private.
Network security needs to be transparent to the end users and should also be designed to
prevent attacks by
Blocking external attackers from accessing the network
Permitting access to only authorized users
Preventing attacks from sourcing internally
Supporting different levels of user access
Safeguarding data from tampering or misuse
Security Legislation
A number of legislative bodies along with the public have insisted that security controls
be in place to protect private information and make certain that it is handled properly.
These legislative bodies influence network security by imposing mandates with which or-
ganizations are required to comply. These requirements might include protecting customer
in question.
 
 
 
Search WWH ::




Custom Search