tailieunhanh - NETWORK+ GUIDE TO NETWORKS, FOURTH EDITION - CHAPTER 14
Network Security Identify security risks in LANs and WANs and design security policies that minimize risks Explain how physical security contributes to network security Discuss hardware- and design-based security techniques Use network operating system techniques to provide basic security Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit Describe how popular authentication protocols, such as RADIUS, TACACS, Kerberos, PAP, CHAP, and MS-CHAP, function Understand wireless security protocols, such as WEP, WPA, and . | Network+ Guide to Networks, Fourth Edition Chapter 14 Network Security Network+ Guide to Networks, 4e Objectives Identify security risks in LANs and WANs and design security policies that minimize risks Explain how physical security contributes to network security Discuss hardware- and design-based security techniques Use network operating system techniques to provide basic security Network+ Guide to Networks, 4e Objectives (continued) Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit Describe how popular authentication protocols, such as RADIUS, TACACS, Kerberos, PAP, CHAP, and MS-CHAP, function Understand wireless security protocols, such as WEP, WPA, and Network+ Guide to Networks, 4e Security Audits Every organization should assess security risks by conducting a security audit Thorough examination of each aspect of network to determine how it might be compromised At least annually, preferably quarterly . | Network+ Guide to Networks, Fourth Edition Chapter 14 Network Security Network+ Guide to Networks, 4e Objectives Identify security risks in LANs and WANs and design security policies that minimize risks Explain how physical security contributes to network security Discuss hardware- and design-based security techniques Use network operating system techniques to provide basic security Network+ Guide to Networks, 4e Objectives (continued) Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit Describe how popular authentication protocols, such as RADIUS, TACACS, Kerberos, PAP, CHAP, and MS-CHAP, function Understand wireless security protocols, such as WEP, WPA, and Network+ Guide to Networks, 4e Security Audits Every organization should assess security risks by conducting a security audit Thorough examination of each aspect of network to determine how it might be compromised At least annually, preferably quarterly The more devastating a threat’s effects and the more likely it is to happen, the more rigorously your security measures should address it In-house or third-party audits Network+ Guide to Networks, 4e Security Risks Not all security breaches result from manipulation of network technology Staff members purposely or inadvertently reveal passwords Undeveloped security policies Malicious and determined intruders may “cascade” their techniques Network+ Guide to Networks, 4e Risks Associated with People Human errors, ignorance, and omissions cause majority of security breaches Risks associated with people: Social engineering or snooping to obtain passwords Incorrectly creating or configuring user IDs, groups, and their associated rights on file server Overlooking security flaws in topology or hardware configuration Overlooking security flaws in OS or application configuration Lack of documentation and communication Network+ Guide to Networks, 4e Risks Associated with People .
đang nạp các trang xem trước