CCNA_Security_09_bupt

CCNA_Security_09_bupt - CCNA Security Chapter 9 Managing a...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
1 CCNA Security Chapter 9 Managing a Secure Network Chapter 9 Managing a Secure Network
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Lesson Planning This lesson should take 3-4 hours to present The lesson should include lecture, demonstrations, discussions and assessments The lesson can be taught in person or using remote instruction
Background image of page 2
3 Major Concepts Describe the principles of secure network design. Describe the Cisco Self Defending Network. Describe the role of operations security in a network. Describe the various techniques and tools to use for network security testing. Describe the principles of business continuity planning and disaster recovery. Describe the SDLC and how to use it to design a Secure Network Life Cycle management process. Describe the functions, goals, role, and structure of a comprehensive security policy.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Contents 9.1 Principles of Secure Network Design 9.2 Cisco Self-Defending Network 9.3 Operations Security 9.4 Network Security Testing 9.5 Business Continuity Planning and Disaster Recovery 9.6 System Development Life Cycle 9.7 Developing a Comprehensive Security Policy
Background image of page 4
5 9.1 Principles of Secure Network Design
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Principles of Secure Network Design Ensuring a Network is Secure Threat Identification and Risk Analysis Risk Management and Risk Avoidance
Background image of page 6
7 Ensuring a Network is Secure Developing Security Policies Guidelines
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Developing Security Policies Business needs: What does the organization want to do with the network? What are the needs of the organization? Threat identification: What threats are most likely to occur, given the organization’s purpose and systems? Risk analysis: What is the cost versus benefit analysis of mitigating, transferring and accepting various security risk? Security needs: What are the policies, procedures, standards, and guidelines needed to address business needs and risks? Industry-recommended practices: What are the security practices that similar organizes currently employ? Security operations: What are the current procedures for system hardening, incident response, monitoring, maintenance, and auditing of the system for compliance?
Background image of page 8
Risk Management Guidelines Expect that any aspect of a security system might fail. Identify any elements that fail-open. Fail-open occurs when a failure results in a complete bypass of the security function. Try to identify all attack possibilities. Evaluate the probability of exploitation. The focus should be on the resources that are needed to create an attack. Assume that people will make mistakes. Attackers will not use common and well-established techniques to compromise a system. Check all assumptions with other people. They might have a fresh
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 97

CCNA_Security_09_bupt - CCNA Security Chapter 9 Managing a...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online