Chapter 11. The Medium Network Implementation
Terms you'll need to understand:
Headend
Man-in-the-middle attack
Network topology discovery
Password attack
Trust exploitation
Techniques you'll need to master:
Performing a threat analysis for VPN services
Analyzing design alternatives
In this chapter, we do with the medium network what we did with the small network in the last chapter—look at it from these five points of view:
Assets to be protected
Threats to those assets
Devices used and their implementation and configuration
Threats mitigated
Design alternatives
In the case of the medium business network, however, we're talking about a larger and more complex edge, although the campus is the same architecturally (even if it has more hosts). The medium network ...
Get CSI Exam Cram™ 2 (Exam 642-541) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.