By Richard Deal
This ebook is a part of the Networking know-how sequence from Cisco Press, which bargains networking pros necessary details for developing effective networks, figuring out new applied sciences, and construction profitable careers.
Read Online or Download Cisco router firewall security PDF
Similar comptia books
This revised version of an Artech residence bestseller is going some distance past the common desktop forensics books out there, emphasizing the best way to guard one's privateness from information robbery and adversarial desktop forensics. the second one variation has been up to date to provide extra targeted how-to counsel on keeping the confidentiality of information kept on desktops, and particular details at the vulnerabilities of generic ancillary computing units, reminiscent of PDAs, mobile phones, clever playing cards, GPS units, cell calling playing cards, fax machines, and photocopiers.
Some time past a number of years, there was an expanding pattern within the use of Radio Frequency identity (RFID) and instant Sensor Networks (WSNs) in addition to within the integration of either structures as a result of their complementary nature, versatile mixture, and the call for for ubiquitous computing. As regularly, enough safety continues to be one of many open components of shock earlier than extensive deployment of RFID and WSNs should be accomplished.
Protection is a speedily becoming sector of computing device technological know-how, with direct and extending relevance to real-life purposes, corresponding to web transactions, e-commerce, info safety, community and platforms safeguard, and so on. Foundations for the research and layout of safety features of such functions are badly wanted so as to validate and turn out their correctness.
Corporation community directors are pressured this present day to aggressively pursue a strong community protection regime. This ebook goals to provide the reader a robust, multi-disciplinary knowing of ways to pursue this aim. This expert quantity introduces the technical concerns surrounding safety in addition to how protection rules are formulated on the government point and communicated during the association.
Extra resources for Cisco router firewall security
However, for sensitive information, encryption should be used to protect it. Obviously, certain network administrators should be allowed to perform eavesdropping in certain situations, such as troubleshooting connectivity issues. Any other type of eavesdropping by anybody else (other employees), however, should not be tolerated and should be dealt with immediately. Another solution is to employ a switched infrastructure, giving every device its own switch port connection. Using this design, even if a hacker has compromised one of the PCs in your network and loads a packet-sniffing tool onto the PC, the hacker will be able to see only traffic directed at the compromised PC or multicast or broadcast traffic.
Day Day Up > < Day Day Up > Security Solutions It is beyond the scope of this book to cover every type of security solution that is available on the market. This section covers some basic solutions that you should be aware of, as well as a security checklist to help strengthen your company's network security. The rest of this book focuses on the Cisco IOS routers for firewalls in implementing security in your network. Designing a Security Solution As you have seen throughout this chapter, a hacker can cause damage to your network in many ways (and this chapter barely skims the surface on the different kinds of attacks that your network will face).
In a session attack, a hacker attacks a session layer connection, hoping either to use this information to mount another attack, or, through subterfuge, to take over the session in which he pretends to be either the source or the destination device. Four general categories of session attacks exist: • Masquerading • Session replay • Session hijacking • Repudiation The following sections cover these session attacks in more depth. Masquerading Attack Masquerading is an attack method that a hacker uses to hide his identity.