Chapter 16

Network Security Fundamentals

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • Why are basic security measures necessary on network devices?

  • How do you identify security vulnerabilities?

  • How do you identify general mitigation techniques?

  • How do you configure network devices with device hardening features to mitigate security threats?

Key Terms

This chapter uses the following key terms. You can find the definitions in the glossary at the end of the book.

virus page 546

worm page 547

Trojan horse page 547

reconnaissance attack page 547

access attack page 547

denial of service (DoS) attack page 547

internet query page 548

ping sweep page 548

port scan page 548

AAA (authentication, ...

Get Introduction to Networks Companion Guide (CCNAv7) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.