CHAPTER 8Protecting the Network

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • How is the defense-in-depth strategy used to protect networks?

  • What are common security policies, regulations, and standards?

  • What are access control policies?

  • How is AAA used to control network access?

  • What information sources are used to communicate emerging network security threats?

  • What threat intelligence is used to identify threats and vulnerabilities?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

asset page 376

edge router page 379

security onion page 379

security artichoke page 380

company policies page 381

employee policies page 381

security policies page ...

Get CCNA Cybersecurity Operations Companion Guide, First Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.