Chapter Summary

This chapter explained what you should consider to secure your networking infrastructure, starting with security tools from Cisco and working through the various other industry security guides from NIST and the NSA. Finally, you learned some standard settings of Microsoft and Apple from their own security guides.

You should take away from this section the importance of positive control of all your devices to ensure that no one can tamper with the network by reconfiguring the devices, attacking a router or firewall/ASA, and ultimately getting into your network infrastructure to wreak havoc.

General concepts and specific features used in Cisco devices and Microsoft operating systems were explained, and you were shown how to incorporate additional elements of a security architecture, including integrity, confidentiality, availability, and audit.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.226.104.27