Chapters & Articles

All Articles

Showing 601-620 of 854

Sort by Date | Title

601.
Secure LAN Switching
Nov 15, 2002
This chapter focuses on the Cisco Catalyst 5000/5500 series switches. We will discuss private VLANs in the context of the 6000 series switches. Generally, similar concepts can be implemented in other types of switches (such as the 1900, 2900, 3000, and 4000 series switches) as well.
602.
Securing a Web App at the Last Minute
Jul 26, 2011
While consumers and the media are increasingly aware of the risks to confidential information over web apps, firms still tend to focus on development, leaving data security until just before the go-live date. Ajay Gupta points out that last-minute steps are available to improve the security of your apps before launching them onto the Internet.
603.
Securing Cisco Device Management
Feb 23, 2016
Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, Academic Edition, discusses available solutions for addressing basic security concerns of Cisco network devices, including important protocols that every security approach should implement.
604.
Securing IoT
Oct 3, 2017

In this sample chapter from IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things, readers will review a brief history of operational technology (OT) security, how it has evolved, and some of the common challenges it faces.

605.
Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
Apr 25, 2013
Ron Fuller shows just how easy it is to take advantage of MACSEC and AES128 bit encryption on your Cisco Nexus 7000 series switches.
606.
Securing the Cisco Security Monitoring, Analysis, and Response System
Jul 3, 2008
This chapter describes recommendations for securing MARS appliances, both physically and electronically.
607.
Securing the Corporate Network
Dec 21, 2001
Authenticate your dial-in users using your local database, and make sure your AAA is in place-- that's authentication, authorization, and accounting.
608.
Securing the Management Plane of a Cisco Network Device
Jul 11, 2011
This article takes a look at a couple of the different features that can be used to secure the management plane of a Cisco network device (or devices) and reviews the basic configuration of these features.
609.
Securing the Management Plane on Cisco IOS Devices
Oct 22, 2012
This chapter, prep for CCNA Security exam 640-554, introduces the concept of the management plane (which is a collection of protocols and access methods we use to configure, manage, and maintain a network device) and examines how to protect it.
610.
Securing Wireless Networks
Jul 2, 2008
This chapter discusses wireless security, including a checklist for securing Wi-Fi.
611.
Securing Your Wi-Fi Hotspot Sessions
Mar 30, 2010
Eric Geier shares tips to keep your email, documents, and computer safe while using Wi-Fi hotspots.
612.
Security
By Simone Arena, Francisco Sedano Crippa, Nicolas Darchis, Sudha Katgeri
Sep 24, 2022

This sample chapter from Understanding and Troubleshooting Cisco Catalyst 9800 Series Wireless Controllers covers the security aspects of the Catalyst 9800 controller. The biggest aspect revolves around AAA, which is either locally handled by the controller or delegated to an external RADIUS or TACACS server.

613.
Security Advocacy and Awareness: Creating A Secure Culture
Nov 24, 2004
All your efforts at securing your network are for naught if your users don't cooperate. This article will provide you with the tools you need to create a secure culture for your organization.
614.
Security by Design: Planning for Security in the Design, Deployment, and Operation of IT Systems
Jul 2, 2014
In this video Keith Barker and Scott Morris discuss the importance of security as part of the design, deployment and operations of information system today.
615.
Security Features on Switches
Jul 4, 2008
This chapter describes Layer 2 security basics and security features on switches available to combat network security threats.
616.
Security Financials: The Core Element of Security Business Proposals
Jun 10, 2005
Security financials help business managers to understand how and why an IT security project costs what it does, which helps business management to understand why funds need to be allocated for IT security, and helps IT to justify their spending. This article explains the benefits of security financials, and what should be in them.
617.
Security in Tcl Scripts for Cisco IOS
Aug 10, 2010
This chapter provides an introduction to PKI infrastructure and goes on to cover the use of digital signatures to sign a Tcl script, a scenario for Tcl script-failure, and scaling Tcl script distribution.
618.
Security Policies
Nov 8, 2002
This chapter presents a way for you to decide what your security goals are and establish, implement, and enforce the security rules that will help you achieve them.
619.
Security Principles
Oct 5, 2017

In this sample chapter from CCNA Cyber Ops SECFND #210-250 Official Cert Guide, explore principles of the defense-in-depth strategy, risk assessments, and more.

620.
Security Through Network Fundamentals
By Brett Hall, Nik Smith
Dec 5, 2020

In this sample chapter from Practical Cisco Unified Communications Security, you will explore the dependencies that Unified Communications (UC) systems have on a network while also highlighting the security features that can be implemented to provide additional security to the UC environment.