After reading this chapter and completing the exercises, you will be able to do the following:
Evaluate a system’s security.
Scan a system for vulnerabilities.
Evaluate the overall security of a network.
Use the “Six Ps” of security.
Apply a patch to your system.
Document your security. ...