CHAPTER 8Protecting the Network


Upon completion of this chapter, you will be able to answer the following questions:

  • How is the defense-in-depth strategy used to protect networks?

  • What are common security policies, regulations, and standards?

  • What are access control policies?

  • How is AAA used to control network access?

  • What information sources are used to communicate emerging network security threats?

  • What threat intelligence is used to identify threats and vulnerabilities?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

asset page 376

edge router page 379

security onion page 379

security artichoke page 380

company policies page 381

employee policies page 381

security policies page ...

Get CCNA Cybersecurity Operations Companion Guide, First Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.