| 61. | - Understanding Cisco Security Agent Components and Installation
- By
Chad Sullivan
- Jul 29, 2005
- In this chapter, you will continue to gain an understanding of the CSA architecture through an exploration of the agent software components, protocol communication, and installation.
|
| 62. | - Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
- By
Chad Sullivan
- Jul 1, 2005
- Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
|
| 63. | - Security Financials: The Core Element of Security Business Proposals
- By
Catherine Paquet
- Jun 10, 2005
- Security financials help business managers to understand how and why an IT security project costs what it does, which helps business management to understand why funds need to be allocated for IT security, and helps IT to justify their spending. This article explains the benefits of security financials, and what should be in them.
|
| 64. | - Troubleshooting Any Transport over MPLS Based VPNs
- By
Mark Lewis
- Jun 10, 2005
- MPLS Layer 3 VPNs allow a service provider to provision IP connectivity for multiple customers over a shared IP backbone, while maintaining complete logical separation of customer traffic and routing information. Learn more about MPLS Layer 3 VPNs in this sample chapter from Cisco.
|
| 65. | - What's New in Cisco PIX Firewall 7.0
- By
David Hucaby
- Jun 10, 2005
- The Cisco PIX Firewall 7.0 has several new features, as well as some familiar features that have received upgrades. Find out what's new and what's improved in this article from David Hucaby.
|
| 66. | - Core Elements of the Cisco Self-Defending Network Strategy
- By
Bob Gleichauf
- May 27, 2005
- Can a network really defend itself? The short answer is, "Yes, it can." Network security has evolved from independently deployed products such as firewalls into the realm of system-wide solutions. And Cisco Systems® is at the forefront of the technology development that is making self-defending networks a reality.
|
| 67. | - Layer 2 VPN Architectures: Understanding Any Transport over MPLS
- By
Wei Luo, Dmitry Bokotey, Anthony YH Chan, Carlos Pignataro
- May 12, 2005
- This chapter provides an overview of LDP, including LDP components and operations that are related to pseudowire emulation over MPLS along with an explanation of the control signaling and data switching details of AToM.
|
| 68. | - Policy, Personnel, and Equipment as Security Enablers
- By
Catherine Paquet, Warren Saxe
- Apr 1, 2005
- Policy plays an integral role in security effectiveness. Educating users on their responsibility to enhance security can have a twofold effect: It ensures that deployed equipment can perform tasks with greater effectiveness, and it creates an environment that encourages and supports individual responsibility.
|
| 69. | - Cracking Wi-Fi Protected Access (WPA), Part 2
- By
Seth Fogie
- Mar 11, 2005
- Concluding his two-part series, Seth Fogie describes in detail how WPA-PSK can be cracked.
|
| 70. | - Cracking Wi-Fi Protected Access (WPA), Part 1
- By
Seth Fogie
- Mar 4, 2005
- In this two-part series, Seth Fogie examines the internals of WPA and demonstrates how this wireless protection method can be cracked with only four packets of data. Part 1 outlines the details of WPA as compared to WEP and builds the foundation for Part 2, in which he describes in detail how WPA-PSK can be cracked.
|
| 71. | - EAP Authentication Protocols for WLANs
- By
Krishna Sankar, Andrew Balinsky, Darrin Miller, Sri Sundaralingam
- Feb 18, 2005
- This chapter examines the authentication methods: EAP, PEAP, LEAP, and the newer, emerging paradigm EAP-FAST, and weighs the pros and cons of each, in terms of standardization maturity and effectiveness.
|
| 72. | - CCSP Cisco Secure PIX Firewall Advanced Exam: CiscoWorks Management Center for Firewalls
- By
Greg Bastien, Earl Carter, Christian Degu
- Jan 7, 2005
- To help you prepare for the CCSP Cisco Secure PIX Firewall Advanced Exam, this chapter provides information on using CiscoWorks with Firewall MC.
|
| 73. | - CCSP CSI Exam Certification: SAFE IP Telephony Design
- By
Ido Dubrawsky, Paul Grey
- Dec 30, 2004
- This chapter will help you prepare for the CCSP CSI Exam, with a focus on SAFE IP Telephony Design. Sample questions are included to help you study.
|
| 74. | - Cisco Network Security Fundamentals: Wireless Security
- By
Gert DeLaet, Gert Schauwers
- Dec 30, 2004
- This chapter covers wireless security—what it is, how it works, how it is configured, what threatens it, and what policies can be designed to secure it.
|
| 75. | - Letting The Telecommuters Into The Network
- By
Rebecca Rohan
- Dec 23, 2004
- You worked hard to keep the space rabble out of your network. Now make sure the good guys can get in.
|
| 76. | - Getting Familiar with Cisco Secure Access Control Server
- Dec 3, 2004
- This chapter covers the basics of the Cisco Secure Access Control Server interface, and familiarizes you with the very simplest of actions in this medium.
|
| 77. | - Security Advocacy and Awareness: Creating A Secure Culture
- By
Warren Saxe, Catherine Paquet
- Nov 24, 2004
- All your efforts at securing your network are for naught if your users don't cooperate. This article will provide you with the tools you need to create a secure culture for your organization.
|
| 78. | - Cisco Asks, Can Security Skills Be Certified?
- By
Yusuf Bhaiji
- Jul 23, 2004
- Yusuf Hussain Bhaiji explores the value of certification in IT Security given its rapidly changing nature and offers suggestions on choosing the right certification program.
|
| 79. | - Wireless Security
- By
Thomas M. Thomas
- Jul 16, 2004
- Tom M. Thomas explains the basics of setting up security for a wireless network. He warns technicians of the various ways in which a wireless network can be breached, and provides help in protecting against those attacks.
|
| 80. | - General Design Considerations for Secure Networks
- By
Sean Convery
- Jun 18, 2004
|