New business practices and opportunities are driving a multitude of changes in all areas of
enterprise networks, and as such, enterprise security is becoming more and more prevalent as
enterprises try to understand and manage the risks associated with the rapid development of
business applications deployed over the enterprise network. This coupled with the exponential
growth of the Internet has presented a daunting security problem to most enterprises: How does the
enterprise implement and update security defenses and practices in an attempt to reduce its
vulnerability to exposure from security breaches?
In this book, I will attempt to bridge the gap between the theory and practice of network security and
place much of its emphasis on securing the enterprise infrastructure, but first let me emphasize that
there is no such thing as absolute security. The statement that a network is secure, is more often
than not, misunderstood to mean that there is no possibility of a security breach. However, as you
will see throughout this book, having a secure network means that the proper security mechanisms
have been put in place in an attempt to reduce most of the risks enterprise assets are exposed to. I
have tried to include enough detail on the theories and protocols for reasonable comprehension so
that the networking professional can make informed choices regarding security technologies.
Although the focus of this book is on the Cisco product offering, the principles apply to many other
environments as well.
enterprise networks, and as such, enterprise security is becoming more and more prevalent as
enterprises try to understand and manage the risks associated with the rapid development of
business applications deployed over the enterprise network. This coupled with the exponential
growth of the Internet has presented a daunting security problem to most enterprises: How does the
enterprise implement and update security defenses and practices in an attempt to reduce its
vulnerability to exposure from security breaches?
In this book, I will attempt to bridge the gap between the theory and practice of network security and
place much of its emphasis on securing the enterprise infrastructure, but first let me emphasize that
there is no such thing as absolute security. The statement that a network is secure, is more often
than not, misunderstood to mean that there is no possibility of a security breach. However, as you
will see throughout this book, having a secure network means that the proper security mechanisms
have been put in place in an attempt to reduce most of the risks enterprise assets are exposed to. I
have tried to include enough detail on the theories and protocols for reasonable comprehension so
that the networking professional can make informed choices regarding security technologies.
Although the focus of this book is on the Cisco product offering, the principles apply to many other
environments as well.
Cisco Network Security Little Black Book was written with the intermediate or advanced user in
mind. The following topics are among those that are covered:
· Internet Protocol Security (IPSec)
· Network Address Translation (NAT)
· Authentication, authorization, and accounting (AAA)
· TCP Intercept
· Unicast Reverse Path Forwarding (Unicast RPF)
· Ethernet Switch Security
How to Use this Book
This book is similar in format to a typical book in the Little Black Book series. Each chapter has two
main sections: "In Brief," followed by "Immediate Solutions."
"In Brief" introduces the subject matter of the chapter and explains the principles it is based upon.
This section does not delve too deeply into details; instead it elaborates only on the points that are
most important for understanding the material in "Immediate Solutions." "Immediate Solutions"
presents several tasks related to the subject of the chapter and presented in "In Brief." The tasks in
"Immediate Solutions" vary from simple to complex. The vast array of task levels provides a broad
coverage of the subject.
This book contains seven chapters. The following sections include a brief preview of each one.
.
.
ไม่มีความคิดเห็น:
แสดงความคิดเห็น