Contents
Contents ....................................................................................................................................................... 1 Introduction .................................................................................................................................................. 3 Cisco Security Management Tools ........................................................................................................... 4 Control of Data ......................................................................................................................................... 4 Security Policy........................................................................................................................................... 5 Risk............................................................................................................................................................ 6 System Development Life Cycle (SDLC) .................................................................................................... 6 Understanding the Risks ............................................................................................................................... 7 Layer 2 risks .............................................................................................................................................. 8 Layer 3 risks .............................................................................................................................................. 9 Upper Layer risks .................................................................................................................................... 11 Physical ................................................................................................................................................... 12 Configuring Devices