Home > Articles > Cisco Network Technology > General Networking > Developing Network Security Strategies

Developing Network Security Strategies

Chapter Description

To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.

From the Book

Top-Down Network Design

Top-Down Network Design, 3rd Edition

$61.60 (Save 20%)

Review Questions

  1. What is the difference between a security plan and a security policy? How do these two relate to each other?

  2. People who are new to security often assume that security simply means encryption. Why is this a naive assumption? What are some other aspects of security that are just as important as encryption?

  3. List and briefly describe four tradeoffs that often must be made in order to achieve good network security.

  4. Research a case that has been in the news in the last few years where a major security breach occurred on a wireless network. Find a case where attackers got in via the wireless network but then penetrated farther into the network, resulting in severe economic or political damage to the victim organization. Write two or three paragraphs about what you found.

6. Design Scenario | Next Section Previous Section