Listen free for 30 days

Listen with offer

Sample
  • Network Infrastructure Security Guidance

  • National Security Agency Cybersecurity Technical Report
  • By: National Security Agency
  • Narrated by: Tom Brooks
  • Length: 3 hrs and 38 mins

£0.00 for first 30 days

Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

Network Infrastructure Security Guidance

By: National Security Agency
Narrated by: Tom Brooks
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £11.99

Buy Now for £11.99

Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.

Summary

Introduction

Guidance for securing networks continues to evolve as new vulnerabilities are exploited by adversaries, new security features are implemented, and new methods of securing devices are identified. Improper configuration, incorrect handling of configurations, and weak encryption keys can expose vulnerabilities in the entire network. All networks are at risk of compromise, especially if devices are not properly configured and maintained. An administrator’s role is critical to securing the network against adversarial techniques and requires dedicated people to secure the devices, applications, and information on the network.

This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network. While the guidance presented here is generic and can be applied to many types of network devices, sample commands for Cisco Internetwork Operating System (IOS) devices are provided which can be executed to implement the recommendations.

1.1 Regarding Zero Trust

Zero Trust is a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy based on an acknowledgement that threats exist both inside and outside traditional network boundaries. The National Security Agency (NSA) fully supports the Zero Trust security model, and much of the guidance in this report can be applied at different boundaries as recommended in Zero Trust guidance. However, this report is focused on providing guidance to mitigate common vulnerabilities and weaknesses on existing networks. As system owners introduce new network designs intended to achieve more mature Zero Trust principles, this guidance may need to be modified.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2022 Tom Brooks (P)2022 Tom Brooks
activate_samplebutton_t1

Listeners also enjoyed...

Computer Science 2.0 Beginners Crash Course cover art
Kali Linux for Beginners cover art
ASP.NET: Programming Success in a Day cover art
CISSP Exam Audio Study Guide! Practice Questions Edition! cover art
Hacking with Kali Linux cover art
Computer Networking Beginners Guide cover art
Hacking for Beginners cover art
Microservices Security in Action cover art
Microservices with Kubernetes: Non-Programmer’s Handbook cover art
Hacking with Kali Linux cover art
Kubernetes Handbook: Non-Programmer’s Guide to Deploy Applications with Kubernetes cover art
Hacking with Kali Linux cover art
CompTIA Network+: Study Guide for the CompTIA Network+ Certification cover art
Simple CISSP Exam Questions cover art
Computer Networking: All in One cover art
Cybersecurity for Beginners cover art

What listeners say about Network Infrastructure Security Guidance

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.