CHAPTER 10

NETWORK SECURITY1

images

THIS CHAPTER describes why networks need security and how to provide it. The first step in any security plan is risk assessment, understanding the key assets that need protection, and assessing the risks to each. There are a variety of steps that can be taken to prevent, detect, and correct security problems due to disruptions, destruction, disaster, and unauthorized access.

OBJECTIVES images

  • Be familiar with the major threats to network security
  • Be familiar with how to conduct a risk assessment
  • Understand how to ensure business continuity
  • Understand how to prevent intrusion

CHAPTER OUTLINE images

10.1 INTRODUCTION

10.1.1 Why Networks Need Security

10.1.2 Types of Security Threats

10.1.3 Network Controls

10.2 RISK ASSESSMENT

10.2.1 Develop a Control Spreadsheet

10.2.2 Identify and Document the Controls

10.2.3 Evaluate the Network's Security

10.3 ENSURING BUSINESS CONTINUITY

10.3.1 Virus Protection

10.3.2 Denial of Service Protection

10.3.3 Theft Protection

10.3.4 Device Failure Protection

10.3.5 Disaster Protection

10.4 INTRUSION PREVENTION

10.4.1 Security Policy

10.4.2 Perimeter Security and Firewalls

10.4.3 Server and Client Protection

10.4.4 Encryption

10.4.5 ...

Get Business Data Communications and Networking, Eleventh Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.