At 1:45 AM +0000 8/25/03, Charlie Wehner wrote:
>Not sure if this what there looking for but in my MCNS book they have the
>following threat types:
>
>Security Threat Types:
>-Reconnaissance
>-Unauthorized access
>-Denial of Service
>-Data Manipulation
I suspect that's the list -- that the people that wrote the test
blueprint worked from the MCNS material rather than the SAFE White
Paper. With the exception of data manipulation, these fall generally
under the list of 12 threats in Appendix B.
I wonder if there's a clue here -- that people studying for the SAFE
test should prefer MCNS over the White Paper.
Personally, I wish the people working on this had done a more
traditional approach from the security literature, approaching it
from the positive characteristics of a secure communications:
Authentic
User
Server/object
Appropriate user privileges
Integrity
Atomic (single record)
Sequential (record stream - protection against replay, deletion, etc.)
Confidentiality
Content confidentiality (also called privacy)
Confidentiality of the existence of the communication (e.g., masking0
Nonrepudiation
Source
Recipient
Protected against denial of service
Auditable
>
>The 4 remote users designs are the following:
>
>o Software accesssRemote user with a software VPN client and personal
>firewall software on the PC
>o Remote-site firewall optionsRemote site is protected with a dedicated
>firewall that provides firewalling and IPSec VPN
>connectivity to corporate headquarters; WAN connectivity is provided via an
>ISP-provided broadband access device (i.e.
>DSL or cable modem).
>o Hardware VPN client optionsRemote site using a dedicated hardware VPN
>client that provides IPSec VPN connectivity
>to corporate headquarters; WAN connectivity is provided via an ISP-provided
>broadband access device
>o Remote-site router optionsRemote site using a router that provides both
>firewalling and IPSec VPN connectivity to corporate
>headquarters. This router can either provide direct broadband access or go
>through and ISP-provided broadband access device.
>
Thanks again. These were the four we used to use in CID, but I
certainly don't see them in the page 30 guidelines.
Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=74323&t=74304
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html