Chapter 19

Welcome to Cybersecurity Network

IN THIS CHAPTER

Bullet Assessing the risk for security

Bullet Determining your basic security philosophy

Bullet Physically securing your network equipment

Bullet Considering user account security

Bullet Looking at other network security techniques

Bullet Making sure your users are secure

As an IT professional, cybersecurity is the thing most likely to keep you awake at night. Consider the following scenarios:

  • Your phone starts ringing like crazy at 3 o’clock one afternoon because no one anywhere on the network can access any of their files. You soon discover that your network has been infiltrated by ransomware, nefarious software that has encrypted every byte of data on your network, rendering it useless to your users until you pay a ransom to recover the data.
  • Your company becomes a headline on CNN because a security breach has resulted in the theft of your customers’ credit ...

Get Networking For Dummies, 12th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.