Lecture5_networkingII

Lecture5_networkingII - ITP 125 Networking, Part II • TCP...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ITP 125 Networking, Part II • TCP • Network Topologies Review • Network Devices • Workstations • Servers • Routers • Firewalls • Secure Network Topologies • DMZ • Tunneling Overview • Every device on a network is susceptible to being compromised • To secure your network, you must not only secure every device, but the infrastructure itself • Today, nearly every computer is connected to a network in some way • Must understand how to secure every part of the network Network Devices • Nodes that users interact with the most • Handles most users e-mail, internet browsing, productivity, etc. • Most susceptible to being compromised • Very easy steps to protect it from being compromised • Remove ANYTHING unnecessary • Protocols, hardware, shared folders, user accounts, services, programs, etc. • Install an antivirus program on it and keep the virus definitions updated • Use a personal firewall • Keep the OS patched with the latest fixes Workstations Servers...
View Full Document

This note was uploaded on 03/21/2011 for the course ITP 125 taught by Professor Greenfield during the Spring '11 term at USC.

Page1 / 16

Lecture5_networkingII - ITP 125 Networking, Part II • TCP...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online