Cisco SAFE Reference GuideOL-19523-01Chapter5 Enterprise CampusKey Threats in the Campus
Key Threats in the Campus
The following are some of the key threats that affect the campus:
Service disruption—Botnets, malware, adware, spyware, viruses, DoS attacks (buffer overflows andendpoint exploitation), Layer-2 attacks, and DDoS on services and infrastructure.
Unauthorized access—Intrusions, unauthorized users, escalation of privileges, IP Spoofing, andunauthorized access to restricted resources.
Data disclosure and modification—Sniffing, man-in-the-middle (MITM) attacks of data while intransit.
Network abuse—Peer-to-peer and instant messaging abuse, out-of-policy browsing, and access toforbidden content.
Data leak—From servers and user endpoints, data in transit and in rest.
Identity theft and fraud—On servers and end users, phishing, and E-mail spam.
Enterprise Campus Design
The campus design follows a modular hierarchical design comprising of core, distribution, and accesslayers. An optional services block using a set of switches providing distribution/access services may beimplemented to host certain services for the local campus users. The modular hierarchical designsegregates the functions of the network into separate building blocks to provide for availability,flexibility, scalability, and fault isolation. Redundancy is achieved by implementing switches in pairs,deploying redundant links, and implementing dynamic routing protocols. This results in a fulltopological redundancy as illustrated inFigure5-1.