Table 19-3 lists the key topics for this chapter. Table 19-3 Key Topics for Chapter 19 Concepts and Actions Review the concepts considered in this chapter using Table 19- 4.
Category: Network Monitoring
Poor Configuration– Cisco Attacks and ThreatsPoor Configuration– Cisco Attacks and Threats
Attackers use social engineering to convince users to turn over their internal access credentials, allow someone into a secured area (such as a corporate office), or access some resource. For
Chapter Review– Cisco Security and Privacy ConceptsChapter Review– Cisco Security and Privacy Concepts
Because forming a mental map of the terms and ideas in a domain is an important place to start your learning journey, this chapter began with an overview of the
Defining Attacks and Threats– Cisco Attacks and ThreatsDefining Attacks and Threats– Cisco Attacks and Threats
Figure 19-1, a fortified wall, will be used as a reference in this discussion of security terms. Figure 19-1 Security Terminology Engineers often use the metaphor of a fortified wall,
“Do I Know This Already?” Quiz– Cisco Attacks and Threats“Do I Know This Already?” Quiz– Cisco Attacks and Threats
Take the quiz (either here or use the PTP software) if you want to use the score to help you decide how much time to spend on this chapter. Appendix
Privacy Concepts– Cisco Security and Privacy ConceptsPrivacy Concepts– Cisco Security and Privacy Concepts
Most engineers—especially network engineers—are happy to leave user privacy to security and privacy professionals. At first glance, it does not seem as though network engineers should worry too much about
The Law and Privacy– Cisco Security and Privacy ConceptsThe Law and Privacy– Cisco Security and Privacy Concepts
Privacy has become a rich area of legislation and legal action over the last decade. Many nations and regions (such as the European Union), following broad public concern, have enacted