19.7. Summary

In this chapter, we covered the key elements that an information technology specialist should be familiar with as related to security. Security is a set of processes and products. In order for a security program to be effective, all of its parts must work and be coordinated by the organization.

Typically, your network will run many protocols and services. These protocols allow connections to other networks and products. However, they also create potential vulnerabilities that must be understood. You must work to find ways to minimize the vulnerabilities. Many protocols and services offered by modern operating systems are highly vulnerable to attack. New methods of attacking these systems are developed every day.

Get CompTIA A+® Complete Deluxe Study Guide:Exams 220-701 (Essentials) and 220-702 (Practical Application) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.