The open nature of the Internet makes it increasingly important for growing businesses to pay attention to the security of their networks. As companies move more of their business functions to the public network, they need to take precautions to ensure that the data is not compromised or that the data does not end up in front of the wrong people.
Unauthorized network access by an outside hacker or disgruntled employee can wreak havoc with proprietary data, negatively affect company productivity, and stunt the ability to compete. Unauthorized network access can also harm relationships with customers and business partners who may question the ability of companies to protect their confidential information.
Upon completing this module, you will be able to develop a comprehensive network security policy to counter threats against information security. The module will describe the threat, present and provide an opportunity to practice the process of developing a security policy, and introduce the Cisco Self-Defending Network strategy. This ability includes being able to meet these objectives:
■ Explain how increasing network security threats will demand comprehensive network security policies
■ Explain the strategies used to mitigate network attacks
■ Describe the common methodologies used by hackers to break into and exploit networks
■ Describe the main activities in each phase of a secure network life cycle
■ Explain how to meet the security needs of a typical enterprise with a comprehensive security policy
■ Describe how to implement the Cisco Self-Defending Network strategy by enhancing an existing network infrastructure with Cisco technologies, products, and solutions
1-2 Securing Cisco Network Devices (SND) v2.0 © 2006 Cisco Systems, Inc.
Was this article helpful?