CHAPTER 8Protecting the Network
Upon completion of this chapter, you will be able to answer the following questions:
How is the defense-in-depth strategy used to protect networks?
What are common security policies, regulations, and standards?
What are access control policies?
How is AAA used to control network access?
What information sources are used to communicate emerging network security threats?
What threat intelligence is used to identify threats and vulnerabilities?
This chapter uses the following key terms. You can find the definitions in the Glossary.