Leacture CH10 - Guide to Networking Essentials Fifth...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Guide to Networking Essentials Fifth Edition Chapter 10 Introduction to Network Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Guide to Networking Essentials, Fifth Edition 2 Objectives Develop a network security policy Secure physical access to network equipment Secure network data Use tools to find network security weaknesses
Background image of page 2
Guide to Networking Essentials, Fifth Edition 3 Network Security Overview and Policies Perceptions of network security vary depending on: People Industry Network security should be as unobtrusive as possible, allowing network users to concentrate on the tasks they want to accomplish, rather than how to get to the data they need to perform those tasks A company that can demonstrate its information systems are secure is more likely to attract customers, partners, and investors
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Guide to Networking Essentials, Fifth Edition 4 Developing a Network Security Policy A network security policy describes the rules governing access to a company’s information resources, the enforcement of those rules, and the steps taken if rules are breached Should also describe the permissible use of those resources after they’re accessed Should be easy for ordinary users to understand and reasonably easy to comply with Should be enforceable Should clearly state the objective of each policy so that everyone understands its purpose
Background image of page 4
Guide to Networking Essentials, Fifth Edition 5 Determining Elements of a Network Security Policy Elements (minimum for most networks) Privacy policy Acceptable use policy Authentication policy Internet use policy Access policy Auditing policy Data protection Security policy should protect organization legally Security policy should be continual work in progress
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Guide to Networking Essentials, Fifth Edition 6 Understanding Levels of Security Security doesn’t come without a cost Before deciding on a level of security, answer: What must be protected? From whom should data be protected? What costs are associated with security being breached and data being lost or stolen? How likely is it that a threat will actually occur? Are the costs to implement security and train users to use a secure network outweighed by the need to provide an efficient, user-friendly environment? Levels: highly restrictive, moderately restrictive, open
Background image of page 6
Guide to Networking Essentials, Fifth Edition 7 Highly Restrictive Security Policies Include features such as: Data encryption, complex password requirements, detailed auditing and monitoring of computer and network access, intricate authentication methods, and policies that govern use of the Internet/e-mail Might require third-party hardware and software High implementation expense High design and configuration costs for SW and HW Staffing to support the security policies Lost productivity (high learning curve for users) Used when cost of a security breach is high
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 51

Leacture CH10 - Guide to Networking Essentials Fifth...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online