After reading this chapter and completing the exercises, you will be able to do the following:
• Identify the top threats to a network: security breaches, denial of service attacks, and malware
• Assess the likelihood of an attack on your network
• Compare and contrast perimeter and layered approaches to network security
• Use online resources to secure your network
It’s hard to find a facet of modern life that does not involve a computer system, at least on some level. Online purchases, debit cards, and automatic bill pay are standard parts of modern life. Some retailers are using computerized ...