O'Reilly logo

CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) by Earl Carter

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1. The Need for Network Security

Upon completion of this chapter, you will be able to perform the following tasks:

  • State the reasons for securing computer networks

  • Identify the basic security concepts

  • Define the four primary security threats

  • Explain the phases of an attack

  • Describe the approaches that attackers use to attack your network

  • Identify the common network attack points

  • Explain the common attack tools

  • Identify common security weaknesses on your network

Studies estimate that the current size of the Internet includes approximately 171 million hosts[1], with more than 665 million unique users[2]. Many companies rely heavily on electronic commerce for their livelihood. Integrating the Internet into business operations is cost-effective and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required