tailieunhanh - Network Security Management Tools

Describe security vulnerability testing, detection, and auditing tools useful in the Cisco network security environment | Network Security Management Tools * Objectives Describe security vulnerability testing, detection, and auditing tools useful in the Cisco network security environment Upon completion of this chapter, you will be able to: * Instructor Note: Present the objectives as a lively, enthusiastic discussion of what will be covered in this chapter. Ask how many students have experience or knowledge of these topics. Stress that the information covered here is fundamental to implementing secure networking Mention that they may want to research network security tools in the cited chapter references. Integrity Testing Tools * Instructor Note: You may want to ask your students what their plans are for using security management tools. You may choose to focus on the key points of this chapter, highlighting the essential or most popular network security tools discussed in the following figures: Scanners: ISS and SATAN Sniffers: network General Password crackers: crack Network utilities (UNIX) Logging . | Network Security Management Tools * Objectives Describe security vulnerability testing, detection, and auditing tools useful in the Cisco network security environment Upon completion of this chapter, you will be able to: * Instructor Note: Present the objectives as a lively, enthusiastic discussion of what will be covered in this chapter. Ask how many students have experience or knowledge of these topics. Stress that the information covered here is fundamental to implementing secure networking Mention that they may want to research network security tools in the cited chapter references. Integrity Testing Tools * Instructor Note: You may want to ask your students what their plans are for using security management tools. You may choose to focus on the key points of this chapter, highlighting the essential or most popular network security tools discussed in the following figures: Scanners: ISS and SATAN Sniffers: network General Password crackers: crack Network utilities (UNIX) Logging tools: Tool suites: File/system integrity checkers System monitors Windows NT and 95 tools Be sure to highlight the Cisco IOS software commands useful for network security Managing the Secure XYZ Network Campus CiscoSecure ACS Server TACACS+, RADIUS Perimeter Router Firewall Bastion Host: Web Server FTP Server Web Surfer Dialup Internet Dialup Client Network Access Server Remote Branch Sales Engineering PSTN/ ISDN Campus Client Token Server * Instructor Note: Point out where network security management tools can be used in the XYZ network. Scanners ISS SafeSuite (UNIX and NT) Top commercial scanner Suite of several scanners with GUI SATAN (UNIX) Security Administrator’s Tool for Analyzing Networks Scans remote hosts for most known security holes * Instructor Note: Scanners are programs designed to automatically detect security weaknesses in a local or remote host. A user can remotely uncover security weaknesses. Scanners (cont.) NSS (UNIX) Strobe (UNIX) Jackal (UNIX) IdentTCPScan .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.