| Providing good internetwork security and remaining current on new hardware and software products is a never-ending task. Every network security manager aims to achieve the best possible security because the risks are real and the stakes are high. An enterprise must decide what level of security is required, taking into account which assets to protect as well as the impact of the measures on costs, personnel, and training. Perfect security is an impossibility, so one must aim for the best possible security by devising a plan to manage the known risks and safe-guard against the potential risks. Defining the enterprise security policy is the first step in implementing good security.
Many security tools are available to help reduce the vulnerability of your network. For example, a firewall can be deployed at the network perimeter to offer an effective protection against many attacks. But a firewall is only one piece in the network security infrastructure. Good host security, regular assessment of the overall vulnerability of the network (audits), good authentication, authorization, accounting practices, and intrusion detection are all valuable tools in combatting network attacks and ensure a network security manager’s “peace of mind.”
Cisco Systems is the worldwide leader in IP networking solutions. They offer a wide array of market-leading network security products: dedicated appliances, routers, and switches, most of which come with some form of security software. Currently, Cisco products comprise much of the Internet’s backbone. An in-depth knowledge of how to configure Cisco IP network security technology is a must for anyone working in today’s internetworked world. This book will provide you with the hands-on Cisco security knowledge you need to get ahead, and stay ahead. |