O'Reilly logo

CCIE Security Exam Certification Guide by Henry Benjamin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Network Security Policies

IP networks are susceptible to unsecured intruders using a number of different methods. Through the campus, by dialup, and through the Internet, an intruder can view IP data and attack vulnerable network devices.

IP networks must provide network security for the following reasons:

  • Inherent technology weaknesses— All network devices and operating systems have inherent vulnerabilities.

  • Configuration weaknesses— Common configuration mistakes can be exploited to open up weaknesses.

  • Network policy— The lack of a network policy can lead to vulnerabilities, such as password security.

  • Outside/inside intruders— Internal and external people always want to exploit network resources and retrieve sensitive data.

Every IP network ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required