Problem solve Get help with specific problems with your technologies, process and projects.

Designing Network Security, Chapter 5

This chapter helps you identify which areas of the network are more susceptible to network intruders and who is the common attacker.

Chapter 5 – Threats in an Enterprise Network

This excerpt is reprinted with permission from Cisco Press. For more information or to order the book, visit the Cisco Press Web site.

With the free flow of information and the high availability of many resources, managers of enterprise networks have to understand all the possible threats to their networks. These threats take many forms, but all result in loss of privacy to some degree and possibly malicious destruction of information or resources that can lead to large monetary losses.

This chapter from Designing Network Security written by Merike Kaeo helps you identify which areas of the network are more susceptible to network intruders and who is the common attacker. The common trend in the past has been to trust users internal to the corporate network and to distrust connections originating from the Internet or from remote access networks using virtual private networks (VPNs), dial-in modems, and Integrated Services Digital Network (ISDN) lines. It is important to place trust in the employees internal to the network and in authorized people trying to use internal network resources from outside the corporation. However, trust must also be weighed with reality.

This chapter is posted in full as a pdf file. To continue reading, click here.

Dig Deeper on Networking Book Excerpts

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close