Chapter 11. NETWORK SECURITY[38]

NETWORK SECURITYThis chapter was written by Alan Dennis and Dwight Worker.

THIS CHAPTER describes why networks need security and how to provide it. The first step in any security plan is risk assessment, understanding the key assets that need protection, and assessing the risks to each. There are a variety of steps that can be taken to prevent, detect, and correct security problems due to disruptions, destruction, disaster, and unauthorized access.

OBJECTIVES

  • Be familiar with the major threats to network security

  • Be familiar with how to conduct a risk assessment

  • Understand how to ensure business continuity

  • Understand how to prevent intrusion

CHAPTER OUTLINE

INTRODUCTION

  • Why Networks Need Security

  • Types of Security Threats

  • Network Controls

RISK ASSESSMENT

  • Develop a Control Spreadsheet

  • Identify and Document the Controls

  • Evaluate the Network's Security

ENSURING BUSINESS CONTINUITY

  • Virus Protection

  • Denial-of-Service Protection

  • Theft Protection

  • Device Failure Protection

  • Disaster Protection

INTRUSION PREVENTION

  • Security Policy

  • Perimeter Security and Firewalls

  • Server and Client Protection

  • Encryption

  • User Authentication

  • Preventing Social Engineering

  • Intrusion Prevention Systems

  • Intrusion Recovery

BEST PRACTICE RECOMMENDATIONS

IMPLICATIONS FOR MANAGEMENT

SUMMARY

INTRODUCTION

Business and government have always been concerned with physical and information security. They have protected physical assets with locks, barriers, guards, and the military since organized ...

Get Business Data Communications and Networking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.