Network Security Policies Vulnerabilities and Protection

This chapter reviews today's most common Cisco security policies and mechanisms available to the Internet community to combat cyber attacks. The security standards body, CERT/CC, is covered, along with descriptions of Cisco IOS-based security methods that ensure that all attacks are reported and acted upon. This chapter will cover, in detail, common exploits such as attacks based on common vulnerabilities, reconnaissance attacks, backdoors, and protocol weaknesses. Cisco Security applications, such as Intrusion Detection System, are covered to finally lay all the building blocks and knowledge you need to master the topics in the CCIE Security written exam.

This chapter covers the following topics:

■ Network Security Policies—Describes standard security policies that should be deployed in any IP network.

■ Standards Bodies and Incident Response Teams—Introduces some of the standards bodies that are designed to help the Internet community tackle intrusion, as well as some forums and e-mail aliases that can help a network security architect.

■ Vulnerabilities, Attacks, and Common Exploits— Presents some of the vulnerabilities that are exploited to attack IP networks, some methods of exploitation, and some of the ways in which data can be misused after a successful attack

■ Intrusion Detection System (IDS)—Describes how an IDS (Cisco IDS, in particular) can be implemented to help deter intruders from gaining access to secure data, including details on how to prevent back doors and protocol weaknesses.

■ Protecting Cisco IOS from Intrusion—Presents some of the standard configurations that should be considered for every Cisco IOS-enabled router connected to the Internet to avoid intruders gaining access to unauthorized material.

Was this article helpful?

0 0

Post a comment