{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

9781111640125_IM_ch05

Security+ Guide to Network Security Fundamentals

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 5-1 Chapter 5 Host, Application, and Data Security At a Glance Instructor’s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional Resources Key Terms
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 5-2 Lecture Notes Overview On the Internet, no single computer is a single application. To deliver an application, there is an operating system, the application environment, management tools, and other tools used to either to enable the application or manage the system. A flaw in any of these systems results in a vulnerability, which represents risk to the system and the data that the system handles. Chapter Objectives List the steps for securing a host computer Define application security Explain how to secure data using data loss prevention Teaching Tips Securing the Host 1. Explain that securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs. Securing Devices 1. Emphasize that one of the most important aspects of host security is also the most obvious: securing the devices themselves so that unauthorized users are prohibited from gaining physical access to equipment. 2. Discuss physical security, which involves restricting access to the areas in which equipment is located. 3. Discuss the different types of hardware locks. 4. Explain that instead of using a key or entering a code to open a door, a user can display an object (sometimes called a physical token) to identify herself. 5. Discuss the use of mantraps, video surveillance, and fencing. 6. Explain that hardware security is the physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks, and tablet computers that can easily be stolen.
Background image of page 2
Security+ Guide to Network Security Fundamentals, Fourth Edition 5-3 7. Emphasize that as smartphones, tablets, netbooks, and similar mobile devices continue to explode in popularity, these devices must also have proper security to protect the data on them. 8. Discuss the features that can be used to secure mobile devices. Securing the Operating System Software 1. Emphasize that in addition to protecting the hardware, the operating system (OS) software that runs on the host must also be protected.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}