601. | - Secure LAN Switching
- Nov 15, 2002
- This chapter focuses on the Cisco Catalyst 5000/5500 series switches. We will discuss private VLANs in the context of the 6000 series switches. Generally, similar concepts can be implemented in other types of switches (such as the 1900, 2900, 3000, and 4000 series switches) as well.
|
602. | - Securing a Web App at the Last Minute
- Jul 26, 2011
- While consumers and the media are increasingly aware of the risks to confidential information over web apps, firms still tend to focus on development, leaving data security until just before the go-live date. Ajay Gupta points out that last-minute steps are available to improve the security of your apps before launching them onto the Internet.
|
603. | - Securing Cisco Device Management
- Feb 23, 2016
- Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, Academic Edition, discusses available solutions for addressing basic security concerns of Cisco network devices, including important protocols that every security approach should implement.
|
604. | - Securing IoT
- Oct 3, 2017
In this sample chapter from IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things, readers will review a brief history of operational technology (OT) security, how it has evolved, and some of the common challenges it faces.
|
605. | - Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
- Apr 25, 2013
- Ron Fuller shows just how easy it is to take advantage of MACSEC and AES128 bit encryption on your Cisco Nexus 7000 series switches.
|
606. | - Securing the Cisco Security Monitoring, Analysis, and Response System
- Jul 3, 2008
- This chapter describes recommendations for securing MARS appliances, both physically and electronically.
|
607. | - Securing the Corporate Network
- Dec 21, 2001
- Authenticate your dial-in users using your local database, and make sure your AAA is in place-- that's authentication, authorization, and accounting.
|
608. | - Securing the Management Plane of a Cisco Network Device
- Jul 11, 2011
- This article takes a look at a couple of the different features that can be used to secure the management plane of a Cisco network device (or devices) and reviews the basic configuration of these features.
|
609. | - Securing the Management Plane on Cisco IOS Devices
- Oct 22, 2012
- This chapter, prep for CCNA Security exam 640-554, introduces the concept of the management plane (which is a collection of protocols and access methods we use to configure, manage, and maintain a network device) and examines how to protect it.
|
610. | - Securing Wireless Networks
- Jul 2, 2008
- This chapter discusses wireless security, including a checklist for securing Wi-Fi.
|
611. | - Securing Your Wi-Fi Hotspot Sessions
- Mar 30, 2010
- Eric Geier shares tips to keep your email, documents, and computer safe while using Wi-Fi hotspots.
|
612. | - Security
- By
Simone Arena, Francisco Sedano Crippa, Nicolas Darchis, Sudha Katgeri
- Sep 24, 2022
This sample chapter from Understanding and Troubleshooting Cisco Catalyst 9800 Series Wireless Controllers covers the security aspects of the Catalyst 9800 controller. The biggest aspect revolves around AAA, which is either locally handled by the controller or delegated to an external RADIUS or TACACS server.
|
613. | - Security Advocacy and Awareness: Creating A Secure Culture
- Nov 24, 2004
- All your efforts at securing your network are for naught if your users don't cooperate. This article will provide you with the tools you need to create a secure culture for your organization.
|
614. | - Security by Design: Planning for Security in the Design, Deployment, and Operation of IT Systems
- Jul 2, 2014
- In this video Keith Barker and Scott Morris discuss the importance of security as part of the design, deployment and operations of information system today.
|
615. | - Security Features on Switches
- Jul 4, 2008
- This chapter describes Layer 2 security basics and security features on switches available to combat network security threats.
|
616. | - Security Financials: The Core Element of Security Business Proposals
- Jun 10, 2005
- Security financials help business managers to understand how and why an IT security project costs what it does, which helps business management to understand why funds need to be allocated for IT security, and helps IT to justify their spending. This article explains the benefits of security financials, and what should be in them.
|
617. | - Security in Tcl Scripts for Cisco IOS
- Aug 10, 2010
- This chapter provides an introduction to PKI infrastructure and goes on to cover the use of digital signatures to sign a Tcl script, a scenario for Tcl script-failure, and scaling Tcl script distribution.
|
618. | - Security Policies
- Nov 8, 2002
- This chapter presents a way for you to decide what your security goals are and establish, implement, and enforce the security rules that will help you achieve them.
|
619. | - Security Principles
- Oct 5, 2017
In this sample chapter from CCNA Cyber Ops SECFND #210-250 Official Cert Guide, explore principles of the defense-in-depth strategy, risk assessments, and more.
|
620. | - Security Through Network Fundamentals
- By
Brett Hall, Nik Smith
- Dec 5, 2020
In this sample chapter from Practical Cisco Unified Communications Security, you will explore the dependencies that Unified Communications (UC) systems have on a network while also highlighting the security features that can be implemented to provide additional security to the UC environment.
|