O'Reilly logo

CCNP Security Secure 642-637 Official Cert Guide by Franklin H. Smith III, Sean Wilkins

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Network Security Threats

This chapter covers the following subjects:

Vulnerabilities: This section reviews the various number of vulnerabilities that must be reviewed when analyzing a network.

Intruder motivations: This section reviews the possible motivating factors that are used by the attacking parties.

Types of network attacks: This section reviews a list of the current network attacks and describes how they are used.

This chapter discusses the potential network vulnerabilities and attacks that pose a threat to networks. In today’s open environment, it has become obvious that security must be a key part of everything up front in order to maintain a truly secured network. In the past, network security was able to be managed ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required