Table 19-3 lists the key topics for this chapter. Table 19-3 Key Topics for Chapter 19 Concepts and Actions Review the concepts considered in this chapter using Table 19- 4.
Category: Log Management
Ransomware– Cisco Attacks and ThreatsRansomware– Cisco Attacks and Threats
Suppose the attacker is concerned about building the C2 system needed to dwell in a breached network for a long while, or perhaps they are concerned the process of exfiltrating
Protecting Logged User Information– Cisco Security and Privacy ConceptsProtecting Logged User Information– Cisco Security and Privacy Concepts
How can network engineers use privacy tools to protect users? Suppression is not as helpful as minimization in network operations. Network operations should record the minimal information possible to maintain
“Do I Know This Already?” Quiz– Cisco Attacks and Threats“Do I Know This Already?” Quiz– Cisco Attacks and Threats
Take the quiz (either here or use the PTP software) if you want to use the score to help you decide how much time to spend on this chapter. Appendix
A Security Taxonomy– Cisco Security and Privacy ConceptsA Security Taxonomy– Cisco Security and Privacy Concepts
Security can be roughly divided into two broad domains: • Organizational security: Protecting the assets and operations of organizations of all sizes and shapes. • Personal security: Protecting the dignity