Information Technology Reference
In-Depth Information
Review the most important topics in the chapter, noted with the Key Topic icon in the
outer margin of the page. Table 13-7 lists a reference of these key topics and the page
numbers on which each is found.
Ta b l e 1 3 -7
Key Topics
Key Topic Element
Description
Page
Summary
Cisco Security Control Framework
486
List
Tr u st and Ident it y technolo g ie s
486
List
Detecting and mitigating threats
490
List
Security platform solutions
495
List
Integrating security into network devices
497
Ta ble 1 3 - 3
Integrated security for Cisco IOS
498
List
Cisco security appliances
499
List
Catalyst 6500 service modules
500
Ta ble 1 3 - 4
Security in the campus
502
Ta ble 1 3 - 5
Security in the data center
504
Ta ble 1 3 - 6
Security in the enterprise edge
505
Print a copy of Appendix D, “Memory Tables,” (found on the CD), or at least the section
for this chapter, and complete the table s and lists from memor y. Appendix E, “Memor y
Ta ble s A n s wer Ke y, ” a l s o on t he C D, i nc l ude s c om ple te d t a ble s a nd l i s t s to c he c k
your work.