O'Reilly logo

Internetworking Technologies Handbook, Fourth Edition by Cisco Systems, Inc.

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 52. Security Technologies

Objectives

  • Describe the need for network security.

  • Identify and explain the security threats posed to networks.

  • Discuss the importance of a security policy and its relationship to network security.

  • Describe a defense-in-depth security solution.

  • Describe how to mitigate the various threats against a network.

  • Identify the tools used to improve network security.

The Internet has evolved from a network simply used to transfer files to a network that is used to purchase automobiles, fill prescriptions, apply for home loans, and pay bills. Companies have realized that to effectively use the network to conduct business, they must secure their networks. Governments have also recognized the need to protect individuals' privacy ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required