MCNS is old material.  The new material is SECUR.  The new material, all
five courses, say it's unstructured, structured, internal, and external...

Fred Reimer - CCNA

Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177  Cell: 770-490-3071  Pager: 888-260-2050

NOTICE; This email contains confidential or proprietary information which
may be legally privileged. It is intended only for the named recipient(s).
If an addressing or transmission error has misdirected the email, please
notify the author by replying to this message. If you are not the named
recipient, you are not authorized to use, disclose, distribute, copy, print
or rely on this email, and should immediately delete it from your computer.


-----Original Message-----
From: Howard C. Berkowitz [mailto:[EMAIL PROTECTED] 
Sent: Monday, August 25, 2003 1:09 AM
To: [EMAIL PROTECTED]
Subject: RE: SAFE and the Holy Hand Grenade of Antioch [7:74304]

At 1:45 AM +0000 8/25/03, Charlie Wehner wrote:
>Not sure if this what there looking for but in my MCNS book they have the
>following threat types:
>
>Security Threat Types:
>-Reconnaissance
>-Unauthorized access
>-Denial of Service
>-Data Manipulation

I suspect that's the list -- that the people that wrote the test 
blueprint worked from the MCNS material rather than the SAFE White 
Paper. With the exception of data manipulation, these fall generally 
under the list of 12 threats in Appendix B.

I wonder if there's a clue here -- that people studying for the SAFE 
test should prefer MCNS over the White Paper.

Personally, I wish the people working on this had done a more 
traditional approach from the security literature, approaching it 
from the positive characteristics of a secure communications:

      Authentic
       User
       Server/object
      Appropriate user privileges
      Integrity
       Atomic (single record)
       Sequential (record stream - protection against replay, deletion,
etc.)
      Confidentiality
       Content confidentiality (also called privacy)
       Confidentiality of the existence of the communication (e.g., masking0
      Nonrepudiation
       Source
       Recipient
      Protected against denial of service
      Auditable

>
>The 4 remote users designs are the following:
>
>o Software accesssRemote user with a software VPN client and personal
>firewall software on the PC
>o Remote-site firewall optionsRemote site is protected with a dedicated
>firewall that provides firewalling and IPSec VPN
>connectivity to corporate headquarters; WAN connectivity is provided via an
>ISP-provided broadband access device (i.e.
>DSL or cable modem).
>o Hardware VPN client optionsRemote site using a dedicated hardware VPN
>client that provides IPSec VPN connectivity
>to corporate headquarters; WAN connectivity is provided via an ISP-provided
>broadband access device
>o Remote-site router optionsRemote site using a router that provides both
>firewalling and IPSec VPN connectivity to corporate
>headquarters. This router can either provide direct broadband access or go
>through and ISP-provided broadband access device.
>

Thanks again.  These were the four we used to use in CID, but I 
certainly don't see them in the page 30 guidelines.
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=74352&t=74304
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

Reply via email to