O'Reilly logo

SUSE LINUX Enterprise Server 9 Administrator's Handbook by Jacques Beland, Peter Kuo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11 Network Security Concepts

Today, information comes in many forms, and consequently, methods of securing it vary. Instead of dividing information into categories based on content, threat analysis and its protection should be based on methods of processing and storage. These methods can be divided into three general categories:

image PhysicalTraditionally, information is “physically recorded” (say, in the form of ink-and-paper or electronically in bits-and-bytes) and stored somewhere (for example, in a box, safe, diskette, or hard drive). Therefore, classical security generally focuses on physical protection, such as access control to buildings, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required