Security Fundamentals
Learn how networks are protected using ACLs, AAA, encryption, and device security features.
Network security protects data, devices, and communication from unauthorized access and attacks.
Confidentiality, Integrity, and Availability are the core principles of security.
Malware, phishing, MITM attacks, and unauthorized access.
Authentication, Authorization, and Accounting framework.
Verifies user identity.
Defines user permissions and access levels.
Tracks user activity and logs actions.
Methods used to securely access network devices.
Encrypted remote access protocol (replaces Telnet).
Unencrypted remote access (not secure, deprecated).
Strong passwords and encryption for device access.
Rules that filter traffic entering or leaving a network.
Filters traffic based only on source IP address.
Filters based on source, destination, protocol, and ports.
Standard ACL near destination, extended ACL near source.
Protecting switches and routers from unauthorized access.
Limits MAC addresses allowed on a switch port.
Prevents rogue DHCP servers.
Protects against ARP spoofing attacks.