CCNA Security - 640-554 Study Notes Network Security involves the following: Confidentiality - Encryption Integrity - Hashing Availability - High reliability, fail over Risk Management Assets are something valuable to a company Vulnerabilities is an exploitable weakness in a system or its design - A vulnerability that is not yet discovered is called a latent threat, whereas a discovered vulnerability is…

Securing layer 2 is an important fundamental aspect which must be covered as there are many different possible attack vectors in the layer 2 realm. Below I'll be detailing some of the more common attack vectors and how to mitigate them. Port Security Attack type: CAM/MAC table overflow Mitigation method: Port Security CAM overflow attacks are caused by a client…

Close