• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Chapter Summary

  • Network security involves the protection of network resources from attacks that originate both inside and outside the network.

  • The first line of defense for network security is user authentication. Users cannot access the network without a valid username and password.

  • Each username must be unique.

  • User passwords can be controlled by the network administrator or by the network users.

  • User account options such as logon hours allowed and the number of connections allowed for an account can be used to increase network security.

  • Share permissions or rights are used to supply different levels of access to users in relation to a particular resource on the network.

  • User groups can be created on the network and then assigned permissions for various network resources. Any user added to a group will also have the same access rights as those assigned to that group.

  • A virus is malicious program code that can replicate and spread from computer to computer on the network.

  • A worm is malware that spreads itself from computer to computer without activation by a user (which differs from a virus). A Trojan is malware masquerading as a regular software program, such as a game or screensaver.

  • Antivirus software can scan storage devices and computer memory as it seeks out and destroys computer viruses.

  • A number of different types of attacks can be launched from outside a network connected to the Internet. These attacks include eavesdropping and IP spoofing.

  • IPSec, a suite of IP security protocols that provide encryption and authentication methods, has been developed to help negate malicious attacks on IP networks.

  • Firewalls are hardware and software devices that can control the flow of data packets between an internal network and an external network such as the Internet.

  • Network security is best implemented when a network security plan has been developed. This plan should identify possible security risks to the network and the methods that will be used to minimize these security risks.



Not a subscriber?

Start A Free Trial

  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint