Chapter 1: Network Security Basics
Identifying security threats
Recognizing the need to implement comprehensive security policies
Understanding network zones
Describing common security appliances and applications
Differentiating between internal and external networks
Understanding firewalls, access control lists (ACLs), Network Address Translation (NAT), and Virtual Private Networks (VPNs)
Mitigating security threats
Taking steps to secure network devices
Astructured threat targeting a vulnerable organization’s computer network is likely taking place as you read this. Due to the rapid growth of the Internet, many forms of security threats have emerged. Viruses, Trojan horse attacks, malicious hackers, and even an organization’s own employees are potential security hazards to corporate networks. These threats have the potential to steal and destroy sensitive corporate data, tie up valuable resources, and inflict major damage due to network downtime. This may lead to a cost crisis and cripple the company financially. Security breaches are also encountered more frequently in home or private networks these days. We all have a reason to be concerned.
A crucial component of protecting internetworks is identifying and understanding the need to implement strong security measures. By preventing security breaches generating from outside users and mitigating unauthorized access to the physical networking equipment — and the digital data it transmits — from inside users, ...