After reading this chapter and completing the exercises, you will be able to do the following:
• Evaluate the effectiveness of a scanner based on how it works
• Choose the best type of firewall for a given organization
• Understand antispyware methods
• Employ intrusion-detection systems to detect problems on your system
• Understand honey pots
Throughout this book, various aspects of computer crime and computer security have been discussed. At this point in your studies, you should have a good idea of what the real dangers are and what adequate security policies include, as well as a basic understanding of the various forms of computer crime. However, if you are striving to ...