Chapter12 - Chapter 12: LAN Security Security Overview...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 12: LAN Security
Background image of page 2
Security Overview Security is not just protecting against hackers, but ensuring that your organization’s data retains its integrity . Ensuring integrity means that the organization’s data is not corrupted, inappropriately accessed, modified, or deleted. When considering security, you must consider all threats to your organization’s network. Be reasonable in your actions. Don’t spend $10,000 protecting a $500 resource.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Threat Overview Computer Viruses. Can infect all computers on a LAN very quickly. Often arrive via e-mail, but also can enter the network via infected files brought in from user’s infected home computer. Viruses require user intervention to replicate. Computer Worms. Similar to viruses except that they do not require user intervention and can replicate automatically. Hacker/Attacker. An unauthorized user who attempts to exploit a weakness in LAN security. Hackers can be bored 13-year-olds or professionals attempting to steal company secrets.
Background image of page 4
Threat Overview Systems Administrators. Have access to everything on the network and can accidentally do damage to the network. Strong auditing policies that report on administrator activities are important. End users. Can deliberately or unintentionally damage equipment or data. Might install unauthorized programs. Environment. Flood, earthquake, fire, tsunami. What happens to your organization’s data if the building catches fire?
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Policies The more secure something is, the more inconvenient it is to access. When securing company assets, you must also consider the needs of the everyday user. Users will not want to type in five passwords to open their e-mail. Determine the value and vulnerability of your organization’s IT assets. A server hosting the company’s intranet is less valuable than the server hosting the company’s accounting database. A server protected by a firewalled network and strong passwords is vulnerable if it is housed underneath your cubicle desk where anyone can open it and walk away with the hard disk drive after hours.
Background image of page 6
Security Policies Spend money wisely. Don’t spend $10,000 dollars protecting a $500 asset. Ensure that users are aware of the network rules. It is more difficult
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 21

Chapter12 - Chapter 12: LAN Security Security Overview...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online