O'Reilly logo

Security Threat Mitigation and Response: Understanding Cisco Security MARS by Greg Abelar, Dale Tesch

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter . Introduction

In today’s network security environment, an epidemic of sorts exists. Many corporations understand that they need security devices to protect them from network-based attacks. The problem is, because security devices have been deployed, corporations blindly trust that they are doing their job and that threats are being stopped. This is the biggest fallacy in the network security world today. Hackers, of course, know this and design attacks to subvert existing security appliances by using valid protocols and valid network packets.

Enterprises and corporations now realize that to really provide effective protection for their networks, they need to take the next step and closely examine network infrastructure, host, application, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required