O'Reilly logo

CCNA Security 640-554 Official Cert Guide by Scott Morris, Keith Barker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Building a Security Strategy

This chapter covers the following subjects:

Securing borderless networks

Controlling and containing data loss

In today’s networks, with so many access methods, including virtual private networks (VPN), remote employees, partner intranets, public access, and so on), we really need to consider all these types of access while building a security strategy. One term used often is borderless networks, which suggests the network does not simply start at one location and end at another location, but instead provides access without physical borders. As the world looks for uninterrupted and ubiquitous access, this concept shows how one person’s dream can be another person’s nightmare.

This chapter examines ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required