• List the different types of network security devices and how they can be used
• Explain how network technologies can enhance security
• Describe secure network design elements
One of the largest security breaches in history exposed the payment card data and personal information of 110 million customers of one of the U.S.’s largest retailers. Although the exact details are shrouded in secrecy, it appears that the lack of basic network security surrounding the retailer’s own network played a significant role in the attack.
Attackers often start by “island hopping.” Instead of attempting to break into a major ...