Home > Articles > Cisco Certification > Network Security Concepts and Policies

Network Security Concepts and Policies

Chapter Description

In this chapter, you learn how to develop a comprehensive network security policy to counter threats against information security. You also learn about possible threats and how to describe and implement the process of developing a security policy.

References

For additional information, refer to these resources.

Publications

Harris, S. CISSP All-in-One Exam Guide, Fifth Edition (McGraw-Hill Professional, 2010).

McClure, S., Scambray, J., and Kurtz, G. Hacking Exposed, Sixth Edition (McGraw-Hill Professional, 2009).

McClure, S., Scambray, J., and Kurtz, G. Hacking Exposed, Seventh Edition (McGraw-Hill Professional, 2012).

NIST SP 800-27 Rev A, Engineering Principles for Information Technology Security.

NIST SP 800-42, Guidelines on Network Security Testing.

NIST SP 800-64 Rev. A, Security Considerations in the Information System Development Life Cycle.

Richardson, R. 2010-2011 CSI Computer Crime and Security Survey (http://gocsi.com/survey).

Wood, C. Information Security Policies Made Easy, Version 11 (Information Shield, 2009).

Web Resources

Insecure.org, http://www.insecure.org/nmap/

SecurityFocus, http://www.securityfocus.com/

Security-Solutions.net, http://www.security-solutions.net/download/index.html

The GNU Netcat Project (G. Giacobbi), http://netcat.sourceforge.net/

The Jargon File, http://www.catb.org/~esr/jargon/html/index.html

7. Review Questions | Next Section Previous Section