Chapter01 - Security+ Guide to Network Security...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 1 Introduction to Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Objectives Describe the challenges of securing information Define information security and explain why it is important Identify the types of attackers that are common today 2
Background image of page 2
Security+ Guide to Network Security Fundamentals, Third Edition Objectives (continued) List the basic steps of an attack Describe the five steps in a defense Explain the different types of information security careers and how the Security+ certification can enhance a security career 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Challenges of Securing Information There is no simple solution to securing information This can be seen through the different types of attacks that users face today As well as the difficulties in defending against these attacks 4
Background image of page 4
Security+ Guide to Network Security Fundamentals, Third Edition Today’s Security Attacks Typical warnings: A malicious program was introduced at some point in the manufacturing process of a popular brand of digital photo frames Nigerian e-mail scam claimed to be sent from the U.N. “Booby-trapped” Web pages are growing at an increasing rate A new worm disables Microsoft Windows Automatic Updating and the Task Manager Apple has issued an update to address 25 security flaws in its operating system OS X 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Today’s Security Attacks (continued) Typical warnings: (continued) The Anti-Phishing Working Group (APWG) reports that the number of unique phishing sites continues to increase Researchers at the University of Maryland attached four computers equipped with weak passwords to the Internet for 24 days to see what would happen These computers were hit by an intrusion attempt on average once every 39 seconds 6
Background image of page 6
Security+ Guide to Network Security Fundamentals, Third Edition Today’s Security Attacks (continued) Security statistics bear witness to the continual success of attackers: TJX Companies, Inc. reported that over 45 million customer credit card and debit card numbers were stolen by attackers over an 18 month period from 2005 to 2007 Table 1-1 lists some of the major security breaches that occurred during a three-month period The total average cost of a data breach in 2007 was $197 per record compromised A recent report revealed that of 24 federal government agencies, the overall grade was only “C−” 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition 8
Background image of page 8
Security+ Guide to Network Security Fundamentals, Third Edition Difficulties in Defending against Attacks Difficulties include the following: Speed of attacks Greater sophistication of attacks Simplicity of attack tools Attackers can detect vulnerabilities more quickly and more readily exploit these vulnerabilities
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 53

Chapter01 - Security+ Guide to Network Security...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online