Network+ Guide to Networks 4th - CHP 14 - Network Security

Network+ Guide to Networks 4th - CHP 14 - Network Security...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Network+ Guide to Networks, Fourth Edition Chapter 14 Network Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network+ Guide to Networks, 4e 2 Objectives Identify security risks in LANs and WANs and design security policies that minimize risks Explain how physical security contributes to network security Discuss hardware- and design-based security techniques Use network operating system techniques to provide basic security
Background image of page 2
Network+ Guide to Networks, 4e 3 Objectives (continued) Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit Describe how popular authentication protocols, such as RADIUS, TACACS, Kerberos, PAP, CHAP, and MS-CHAP, function Understand wireless security protocols, such as WEP, WPA, and 802.11i
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network+ Guide to Networks, 4e 4 Security Audits Every organization should assess security risks by conducting a security audit Thorough examination of each aspect of network to determine how it might be compromised At least annually, preferably quarterly The more devastating a threat’s effects and the more likely it is to happen, the more rigorously your security measures should address it In-house or third-party audits
Background image of page 4
Network+ Guide to Networks, 4e 5 Security Risks Not all security breaches result from manipulation of network technology Staff members purposely or inadvertently reveal passwords Undeveloped security policies Malicious and determined intruders may “cascade” their techniques
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network+ Guide to Networks, 4e 6 Risks Associated with People Human errors, ignorance, and omissions cause majority of security breaches Risks associated with people: Social engineering or snooping to obtain passwords Incorrectly creating or configuring user IDs, groups, and their associated rights on file server Overlooking security flaws in topology or hardware configuration Overlooking security flaws in OS or application configuration Lack of documentation and communication
Background image of page 6
Network+ Guide to Networks, 4e 7 Risks Associated with People (continued) Risks associated with people (continued): Dishonest or disgruntled employees Unused computer or terminal left logged on Easy-to-guess passwords Leaving computer room doors open or unlocked Discarding disks or backup tapes in public waste containers Neglecting to remove access and file rights when required Writing passwords on paper
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network+ Guide to Networks, 4e 8 Risks Associated with Transmission and Hardware Risks inherent in network hardware and design: Transmissions can be intercepted Networks using leased public lines vulnerable to eavesdropping Network hubs broadcast traffic over entire segment Unused hub, router, or server ports can be exploited and accessed by hackers Not properly configuring routers to mask internal subnets
Background image of page 8
Network+ Guide to Networks, 4e 9 Risks Associated with Transmission and Hardware (continued) Risks inherent in network hardware and design
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/28/2010 for the course NETWORK+ G Networks+ taught by Professor None during the Three '10 term at University of Sydney.

Page1 / 56

Network+ Guide to Networks 4th - CHP 14 - Network Security...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online