CHAPTER 15

Understanding Network Security

In this chapter, you will learn about

•   Understanding how encryption works

•   Implementing secured tunnel networks

•   Configuring high-availability networking

•   Understanding single sign-on

•   Defending against network attacks

•   Encrypting files with GPG

We came up with the standard to allow different CAD systems to communicate.

—Walt Braithwaite, Boeing

Unethical hackers have figured out that a minimal amount of information can yield huge profits, and they will stop at nothing to get it. As a result, ethical hackers must be obsessive about information security.

Network security is focused on protecting valuable electronic information of organizations and users. Therefore, the demand for IT ...

Get CompTIA Linux+ Certification All-in-One Exam Guide, Second Edition (Exam XK0-005), 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.