At 1:45 AM +0000 8/25/03, Charlie Wehner wrote: >Not sure if this what there looking for but in my MCNS book they have the >following threat types: > >Security Threat Types: >-Reconnaissance >-Unauthorized access >-Denial of Service >-Data Manipulation
I suspect that's the list -- that the people that wrote the test blueprint worked from the MCNS material rather than the SAFE White Paper. With the exception of data manipulation, these fall generally under the list of 12 threats in Appendix B. I wonder if there's a clue here -- that people studying for the SAFE test should prefer MCNS over the White Paper. Personally, I wish the people working on this had done a more traditional approach from the security literature, approaching it from the positive characteristics of a secure communications: Authentic User Server/object Appropriate user privileges Integrity Atomic (single record) Sequential (record stream - protection against replay, deletion, etc.) Confidentiality Content confidentiality (also called privacy) Confidentiality of the existence of the communication (e.g., masking0 Nonrepudiation Source Recipient Protected against denial of service Auditable > >The 4 remote users designs are the following: > >o Software accesssRemote user with a software VPN client and personal >firewall software on the PC >o Remote-site firewall optionsRemote site is protected with a dedicated >firewall that provides firewalling and IPSec VPN >connectivity to corporate headquarters; WAN connectivity is provided via an >ISP-provided broadband access device (i.e. >DSL or cable modem). >o Hardware VPN client optionsRemote site using a dedicated hardware VPN >client that provides IPSec VPN connectivity >to corporate headquarters; WAN connectivity is provided via an ISP-provided >broadband access device >o Remote-site router optionsRemote site using a router that provides both >firewalling and IPSec VPN connectivity to corporate >headquarters. This router can either provide direct broadband access or go >through and ISP-provided broadband access device. > Thanks again. These were the four we used to use in CID, but I certainly don't see them in the page 30 guidelines. Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=74323&t=74304 -------------------------------------------------- **Please support GroupStudy by purchasing from the GroupStudy Store: http://shop.groupstudy.com FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html