Table 19-3 lists the key topics for this chapter. Table 19-3 Key Topics for Chapter 19 Concepts and Actions Review the concepts considered in this chapter using Table 19- 4.
Category: Network Infrastructure
Poor Configuration– Cisco Attacks and ThreatsPoor Configuration– Cisco Attacks and Threats
Poor configuration, including poor passwords, is the primary cause of breaches. Basic rules in this area include • Make certain attack surfaces are well understood and each apparent vulnerability is
Chapter Review– Cisco Security and Privacy ConceptsChapter Review– Cisco Security and Privacy Concepts
Because forming a mental map of the terms and ideas in a domain is an important place to start your learning journey, this chapter began with an overview of the
The Law and Privacy– Cisco Security and Privacy ConceptsThe Law and Privacy– Cisco Security and Privacy Concepts
Privacy has become a rich area of legislation and legal action over the last decade. Many nations and regions (such as the European Union), following broad public concern, have enacted
Noise Injection– Cisco Security and Privacy ConceptsNoise Injection– Cisco Security and Privacy Concepts
Rather than stripping out, or suppressing, data, noise injection inserts or replaces existing information with false data. Figure 18-6 illustrates noise injection. Figure 18-6 Noise Injection Figure 18-6 shows two