Chapter 19
Welcome to Cybersecurity Network
IN THIS CHAPTER
Assessing the risk for security
Determining your basic security philosophy
Physically securing your network equipment
Considering user account security
Looking at other network security techniques
Making sure your users are secure
As an IT professional, cybersecurity is the thing most likely to keep you awake at night. Consider the following scenarios:
- Your phone starts ringing like crazy at 3 o’clock one afternoon because no one anywhere on the network can access any of their files. You soon discover that your network has been infiltrated by ransomware, nefarious software that has encrypted every byte of data on your network, rendering it useless to your users until you pay a ransom to recover the data.
- Your company becomes a headline on CNN because a security breach has resulted in the theft of your customers’ credit ...
Get Networking For Dummies, 12th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.