Network Infrastructure Security Guidance Audiolibro Por National Security Agency arte de portada

Network Infrastructure Security Guidance

National Security Agency Cybersecurity Technical Report

Vista previa

Obtener oferta Prueba por $0.00
La oferta termina el 30 de abril, 2025 a las 11:59PM PT.
Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible?
Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra colección inigualable
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95/mes después de 3 meses. Cancela en cualquier momento.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.

Network Infrastructure Security Guidance

De: National Security Agency
Narrado por: Tom Brooks
Obtener oferta Prueba por $0.00

La oferta termina el 30 de abril, 2025 a las 11:59PM PT.

$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por $14.95

Compra ahora por $14.95

Confirma la compra
la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.
Cancelar

Acerca de esta escucha

Introduction

Guidance for securing networks continues to evolve as new vulnerabilities are exploited by adversaries, new security features are implemented, and new methods of securing devices are identified. Improper configuration, incorrect handling of configurations, and weak encryption keys can expose vulnerabilities in the entire network. All networks are at risk of compromise, especially if devices are not properly configured and maintained. An administrator’s role is critical to securing the network against adversarial techniques and requires dedicated people to secure the devices, applications, and information on the network.

This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network. While the guidance presented here is generic and can be applied to many types of network devices, sample commands for Cisco Internetwork Operating System (IOS) devices are provided which can be executed to implement the recommendations.

1.1 Regarding Zero Trust

Zero Trust is a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy based on an acknowledgement that threats exist both inside and outside traditional network boundaries. The National Security Agency (NSA) fully supports the Zero Trust security model, and much of the guidance in this report can be applied at different boundaries as recommended in Zero Trust guidance. However, this report is focused on providing guidance to mitigate common vulnerabilities and weaknesses on existing networks. As system owners introduce new network designs intended to achieve more mature Zero Trust principles, this guidance may need to be modified.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2022 Tom Brooks (P)2022 Tom Brooks
Seguridad y Cifrado Seguridad para computadora Hackeo Codificación Software

Lo que los oyentes dicen sobre Network Infrastructure Security Guidance

Calificaciones medias de los clientes

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.