O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

In the previous six chapters, you've learned many of the concepts behind building a solid defense strategy to protect your networks. You've learned that firewalls, intrusion detection systems, security policies, and a strong disaster plan are essential to ensuring secure continuity of operations. However, even the best-laid plans have weaknesses and, occasionally, a hacker uncovers and exploits these vulnerabilities to the detriment of your systems (and your sanity!).

This chapter focuses on two areas of concern:

  • The tools and techniques hackers may utilize to either gain unauthorized access to your network or deny that access to legitimate users.

  • The proper procedures to follow when a computer security incident takes place that affects ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required