Chapter 52. Security Technologies

Objectives

  • Describe the need for network security.

  • Identify and explain the security threats posed to networks.

  • Discuss the importance of a security policy and its relationship to network security.

  • Describe a defense-in-depth security solution.

  • Describe how to mitigate the various threats against a network.

  • Identify the tools used to improve network security.

The Internet has evolved from a network simply used to transfer files to a network that is used to purchase automobiles, fill prescriptions, apply for home loans, and pay bills. Companies have realized that to effectively use the network to conduct business, they must secure their networks. Governments have also recognized the need to protect individuals' privacy ...

Get Internetworking Technologies Handbook, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.