Home > Articles > Cisco

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Chapter Summary

After reading through this chapter, you should have a general understanding of the types of security threats that are prevalent in our high-tech, information-driven society and various ways to mitigate those threats. A responsible network administrator must be aware of these possible attacks to protect the network from any form of security breach. Cisco offers built-in security management features that can be configured before the equipment is installed on the local network. It is also possible to purchase additional hardware and software to enhance overall security. The Cisco catalog includes IOS versions of firewall, IPS, IPsec VPN, and SSL VPN. You also have a variety of network security appliances to choose from, depending on the size and needs of your particular company.

Key Terms

  • Access attack
  • Reconnaissance attack
  • Denial of service (DoS) attack
  • Password attack
  • Trust exploitation
  • Port redirection
  • Man-in-the-middle attack
  • Packet sniffer
  • Port scan
  • Ping sweep
  • Information query
  • IP spoofing
  • Ping of death
  • Teardrop attack
  • Distributed DoS attack
  • TCP SYN attack
  • Smurf attack
  • Authentication, Authorization, and Accounting (AAA)
  • Access control list (ACL)
  • Secure Shell (SSH)
  • Simple Network Management Protocol (SNMP)
  • SYSLOG
  • Network Time Protocol (NTP)
  • Internet Protocol Security (IPsec)
  • Secure Socket Layer (SSL)
  • Firewall
  • Intrusion Prevention System (IPS)
  • Intrusion Detection System (IDS)
  • + Share This
  • 🔖 Save To Your Account