Chapter 3. Understanding Defenses

On completing this chapter, you will be able to

  • Explain how digital IDs can protect a network

  • Describe intrusion protection and intrusion prevention techniques

  • Explain how PC card–based solutions can counter network weaknesses

  • Explain how different encryption techniques protect a network environment

  • Describe physical security of a site that uses access control and biometric techniques

  • Explain how antivirus software is used

  • List the basic functions of a firewall

Immense numbers of tools, techniques, systems, services, and processes are available to protect your data in today's challenging network environment. This chapter presents an overview of the techniques used to counter the network weaknesses discussed in Chapter ...

Get Network Security Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.