Table 19-3 lists the key topics for this chapter. Table 19-3 Key Topics for Chapter 19 Concepts and Actions Review the concepts considered in this chapter using Table 19- 4.
Category: Configuration Management
Reflection Attack– Cisco Attacks and ThreatsReflection Attack– Cisco Attacks and Threats
Reflection attacks use well-connected servers to reflect and amplify a DDoS attack. Figure 19-5 illustrates a reflection attack. Figure 19-5 DDoS Reflection Attack A DDoS reflection attack proceeds in two
Protecting Logged User Information– Cisco Security and Privacy ConceptsProtecting Logged User Information– Cisco Security and Privacy Concepts
How can network engineers use privacy tools to protect users? Suppression is not as helpful as minimization in network operations. Network operations should record the minimal information possible to maintain
Defining Attacks and Threats– Cisco Attacks and ThreatsDefining Attacks and Threats– Cisco Attacks and Threats
Figure 19-1, a fortified wall, will be used as a reference in this discussion of security terms. Figure 19-1 Security Terminology Engineers often use the metaphor of a fortified wall,
A Security Taxonomy– Cisco Security and Privacy ConceptsA Security Taxonomy– Cisco Security and Privacy Concepts
Security can be roughly divided into two broad domains: • Organizational security: Protecting the assets and operations of organizations of all sizes and shapes. • Personal security: Protecting the dignity
Privacy Concepts– Cisco Security and Privacy ConceptsPrivacy Concepts– Cisco Security and Privacy Concepts
Most engineers—especially network engineers—are happy to leave user privacy to security and privacy professionals. At first glance, it does not seem as though network engineers should worry too much about
The Law and Privacy– Cisco Security and Privacy ConceptsThe Law and Privacy– Cisco Security and Privacy Concepts
Privacy has become a rich area of legislation and legal action over the last decade. Many nations and regions (such as the European Union), following broad public concern, have enacted
Noise Injection– Cisco Security and Privacy ConceptsNoise Injection– Cisco Security and Privacy Concepts
Rather than stripping out, or suppressing, data, noise injection inserts or replaces existing information with false data. Figure 18-6 illustrates noise injection. Figure 18-6 Noise Injection Figure 18-6 shows two