January 2021
Beginner
565 pages
19h 27m
English
This chapter presented an overview of network security. You learned about the three tenets of security—availability, integrity, and confidentiality—and how they work independently and together to form the basis for information systems security.
You learned about network security and how to define the scope. Once you define the scope, the best way to find gaps, risks, threats, and vulnerabilities is to perform a security risk assessment. Focusing on network security can limit the scope of your risk assessment. Including users, applications, and data allows your security risk assessment to address the entire organization. A network security risk assessment usually includes vulnerability assessment scanning and intrusive penetration ...