Security

All Security Articles

Showing 61-80 of 105

Sort by Date | Title | Popularity

61.
Understanding Cisco Security Agent Components and Installation
By Chad Sullivan
Jul 29, 2005
In this chapter, you will continue to gain an understanding of the CSA architecture through an exploration of the agent software components, protocol communication, and installation.
62.
Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
By Chad Sullivan
Jul 1, 2005
Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
63.
Security Financials: The Core Element of Security Business Proposals
By Catherine Paquet
Jun 10, 2005
Security financials help business managers to understand how and why an IT security project costs what it does, which helps business management to understand why funds need to be allocated for IT security, and helps IT to justify their spending. This article explains the benefits of security financials, and what should be in them.
64.
Troubleshooting Any Transport over MPLS Based VPNs
By Mark Lewis
Jun 10, 2005
MPLS Layer 3 VPNs allow a service provider to provision IP connectivity for multiple customers over a shared IP backbone, while maintaining complete logical separation of customer traffic and routing information. Learn more about MPLS Layer 3 VPNs in this sample chapter from Cisco.
65.
What's New in Cisco PIX Firewall 7.0
By David Hucaby
Jun 10, 2005
The Cisco PIX Firewall 7.0 has several new features, as well as some familiar features that have received upgrades. Find out what's new and what's improved in this article from David Hucaby.
66.
Core Elements of the Cisco Self-Defending Network Strategy
By Bob Gleichauf
May 27, 2005
Can a network really defend itself? The short answer is, "Yes, it can." Network security has evolved from independently deployed products such as firewalls into the realm of system-wide solutions. And Cisco Systems® is at the forefront of the technology development that is making self-defending networks a reality.
67.
Layer 2 VPN Architectures: Understanding Any Transport over MPLS
By Wei Luo, Dmitry Bokotey, Anthony YH Chan, Carlos Pignataro
May 12, 2005
This chapter provides an overview of LDP, including LDP components and operations that are related to pseudowire emulation over MPLS along with an explanation of the control signaling and data switching details of AToM.
68.
Policy, Personnel, and Equipment as Security Enablers
By Catherine Paquet, Warren Saxe
Apr 1, 2005
Policy plays an integral role in security effectiveness. Educating users on their responsibility to enhance security can have a twofold effect: It ensures that deployed equipment can perform tasks with greater effectiveness, and it creates an environment that encourages and supports individual responsibility.
69.
Cracking Wi-Fi Protected Access (WPA), Part 2
By Seth Fogie
Mar 11, 2005
Concluding his two-part series, Seth Fogie describes in detail how WPA-PSK can be cracked.
70.
Cracking Wi-Fi Protected Access (WPA), Part 1
By Seth Fogie
Mar 4, 2005
In this two-part series, Seth Fogie examines the internals of WPA and demonstrates how this wireless protection method can be cracked with only four packets of data. Part 1 outlines the details of WPA as compared to WEP and builds the foundation for Part 2, in which he describes in detail how WPA-PSK can be cracked.
71.
EAP Authentication Protocols for WLANs
By Krishna Sankar, Andrew Balinsky, Darrin Miller, Sri Sundaralingam
Feb 18, 2005
This chapter examines the authentication methods: EAP, PEAP, LEAP, and the newer, emerging paradigm EAP-FAST, and weighs the pros and cons of each, in terms of standardization maturity and effectiveness.
72.
CCSP Cisco Secure PIX Firewall Advanced Exam: CiscoWorks Management Center for Firewalls
By Greg Bastien, Earl Carter, Christian Degu
Jan 7, 2005
To help you prepare for the CCSP Cisco Secure PIX Firewall Advanced Exam, this chapter provides information on using CiscoWorks with Firewall MC.
73.
CCSP CSI Exam Certification: SAFE IP Telephony Design
By Ido Dubrawsky, Paul Grey
Dec 30, 2004
This chapter will help you prepare for the CCSP CSI Exam, with a focus on SAFE IP Telephony Design. Sample questions are included to help you study.
74.
Cisco Network Security Fundamentals: Wireless Security
By Gert DeLaet, Gert Schauwers
Dec 30, 2004
This chapter covers wireless security—what it is, how it works, how it is configured, what threatens it, and what policies can be designed to secure it.
75.
Letting The Telecommuters Into The Network
By Rebecca Rohan
Dec 23, 2004
You worked hard to keep the space rabble out of your network. Now make sure the good guys can get in.
76.
Getting Familiar with Cisco Secure Access Control Server
Dec 3, 2004
This chapter covers the basics of the Cisco Secure Access Control Server interface, and familiarizes you with the very simplest of actions in this medium.
77.
Security Advocacy and Awareness: Creating A Secure Culture
By Warren Saxe, Catherine Paquet
Nov 24, 2004
All your efforts at securing your network are for naught if your users don't cooperate. This article will provide you with the tools you need to create a secure culture for your organization.
78.
Cisco Asks, Can Security Skills Be Certified?
By Yusuf Bhaiji
Jul 23, 2004
Yusuf Hussain Bhaiji explores the value of certification in IT Security given its rapidly changing nature and offers suggestions on choosing the right certification program.
79.
Wireless Security
By Thomas M. Thomas
Jul 16, 2004
Tom M. Thomas explains the basics of setting up security for a wireless network. He warns technicians of the various ways in which a wireless network can be breached, and provides help in protecting against those attacks.
80.
General Design Considerations for Secure Networks
By Sean Convery
Jun 18, 2004