Terms You’ll Need to Understand: |
|
---|---|
Interceptors |
|
SCSI (Small Computer Systems Interface) over TCP/IP (iSCSI) |
|
Fiber Channel over IP (FCIP) |
|
Fiber Channel |
|
Logical Unit Number (LUN) |
|
Worldwide Number (WWN) |
|
Vishing |
|
Exam Topics Covered in This Chapter: |
|
---|---|
Describe and list mitigation methods for common network attacks |
|
Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks |
These exam topics are from cisco.com. Check there periodically for the latest exam topics and info.
Now it’s time to focus on the last element of implementation of a comprehensive network security policy: security inside the perimeter.
Inside the network perimeter is often where security is its most lax or, worse, nonexistent. Security practitioners are often guilty of spending so much time looking for the enemy outside the walls of the fortification that they become victims of attacks from within. Just ask the people of the ancient city of Troy what one well-placed Trojan horse can do to security! Many experienced security practitioners can relate to this last point.
This chapter examines the items that are often orphaned by a poorly implemented security policy, namely:
Endpoints
Storage Area Networks (SANs)
Voice over IP (VoIP) Infrastructure
In examining these three areas, we will likely discover that there are many reasons to be somewhat insecure about their implementation. Security is often an afterthought (if it has been thought of at all!) in these technologies.