- 1 News & Tools
- 2 Exam 3 Debriefing
- 3 Quiz – Hands-on Troubleshooting
- 4 Authentication, Authorization, and Accounting, or AAA
- 5 Network Security Threats
- 6 Three Primary Network Attacks
- 7 Network Attacks
- 8 Security Program Elements
- 9 Layer 2 Security Features
- 10 Authentication Methods
- 11 Managing User Accounts
- 12 Security Password Policy Elements
- 13 User-Authentication Methods
- 14 Setting Passwords
- 15 Read / Watch / Do
- 16 Better Focus and Efficient Studying When Not Multitasking
News & Tools
- An Amazon server outage is causing problems for Alexa, Ring, Disney Plus, and deliveries: Problems with some Amazon Web Services cloud servers are causing slow loading or failures for significant chunks of the internet. Amazon’s widespread network of data centers powers many of the things you interact with online.
- Amazon’s official status page
- Chinese hackers used Pulse Secure VPN zero-day to breach US defense contractors
- 10,000+ unpatched home alarm systems can be deactivated remotely
- Army CID Cautions Rise in QR Code Scams
- Sneakers, Gaming, Nvidia Cards: Retailers Can Stop Shopping Bots
- The Wages of Password Re-use: Your Money or Your Life
Exam 3 Debriefing
Quiz – Hands-on Troubleshooting
Requires: Cisco Packet Tracer v8.x.
- Duration is 60 minutes.
- You are required to Save and exit from Packet Tracer before the time reaches 60 minutes.
- Quiz must be received by my e-mail before 10 pm tonight. (And the time must be <=60 minutes.)
- The needed assets are on the class Download page.
- AAA is a technology that gives us substantial control over users and what they’re permitted to do inside of our networks.
- RADIUS and TACACS+ security servers like Integrated Services Engine ISE help us implement a centralized security plan by recording network events to the security server, or to a Syslog server via logging.
Network Security Threats
The four (4) primary threats to network security
- Unstructured Threats
- Structured Threats
- External Threats
- Internal Threats
Three Primary Network Attacks
- Reconnaissance Attacks
- Access Attacks
- Denial of Service (DoS) Attacks
Security Program Elements
- User awareness
- Physical security
Layer 2 Security Features
- The bottom layer of this model, the Access Layer, controls user and workgroup access to internetwork resources.
- Sometimes it’s referred to as the desktop layer.
- Username and Password
- PAP, and CHAP authentication
- Windows Authentication
- Security Server Authentication
Managing User Accounts
- Disabling Accounts
Security Password Policy Elements
- Password Management
Read / Watch / Do
- Read Chapter 17: Internet Protocol v6 (IPv6)
- Do the Written Labs
- Answer the Review Questions
- Do not submit your answers for this chapter. The answers are in Appendix.