Chapter 1. Introduction to Network Security
When networks first started appearing, they tended to be isolated, stand-alone networks. Securing these private networks was relatively easy: make sure critical assets were backed up regularly, keep the power on, and keep plenty of spare replacement parts in the cupboard. These networks did not provide much function, though, and they did not stay isolated for very long.
Computer installations during the 1950s consisted of stand-alone mainframes that used punch cards for data entry and magnetic tapes for data storage. These systems were mostly automated calculating machines with limited processing power and no interconnectivity.
The next step was to connect disk storage devices and dumb terminals to ...
Get CCSP Self-Study: Securing Cisco IOS Networks (SECUR) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.