官术网_书友最值得收藏!

Secure Network Design

In the previous chapter you learned about the basic concept of infrastructure security and built a strong foundation for the different areas required to understand the need for information security based on current security threats that exist in cyber space.

The internet has grown dramatically and has reached a stage where everyone must be connected in order to exchange information. Imagine that billions of people with internet enabled devices are directly connected to the internet, and some sort of unsecured network becomes a target for cyber criminals.

In this chapter, we describe how to secure a network and look at the significance of network security. In a layered fashion, we will also discuss methods and approaches to building a secure network based on business aims.

The following topics will be covered in this chapter:

  • Access control
  • Network management and security design
  • Hardening your TCP/IP stack
  • DoS and DDoS attacks
  • IP spoofing
  • Ping sweeps and port scans
  • DNS vulnerabilities
  • Two-factor authentication
主站蜘蛛池模板: 沧源| 巴里| 衡阳市| 台湾省| 蒙城县| 东方市| 贺兰县| 察哈| 台东市| 尉犁县| 灵武市| 盐池县| 江达县| 永善县| 武功县| 六枝特区| 祥云县| 元朗区| 平利县| 瑞昌市| 甘肃省| 扎囊县| 婺源县| 河南省| 方山县| 新平| 弋阳县| 阿合奇县| 滦南县| 洪湖市| 镶黄旗| 汝州市| 洱源县| 五大连池市| 彭州市| 丹棱县| 凤山市| 喀喇沁旗| 泰安市| 荥经县| 左贡县|