Definition of Key Terms

Define the following key terms from this chapter, and check your answers in the glossary:

confidentiality, integrity, availability, preventive control, deterrent control, detective control, vulnerability, exploit, phreaker, Defense in Depth, IP spoofing, data diddling, salami attack, denial of service (DoS)

This page intentionally left blank

This chapter covers the following topics:

Increasing operations security: This section explains the day-to-day procedures for deploying, maintaining, and retiring information security components.

Constructing a comprehensive network security policy: This section discusses considerations and principles for writing a security policy, in addition to making users aware of the policy.

Creating a Cisco Self-Defending Network:

This section describes the Cisco Self-Defending Network, which is the Cisco vision for security systems.

0 0

Post a comment