Security Policy Implementation

Submitted by: Submitted by

Views: 690

Words: 18302

Pages: 74

Category: Science and Technology

Date Submitted: 01/17/2012 03:37 PM

Report This Essay

CHAPTER

1

NETWORK DEFENSE FUNDAMENTALS

After reading this chapter and completing the exercises, you will be able to: ♦ ♦ ♦ ♦ ♦

Explain the fundamentals of TCP/IP networking Describe the threats to network security Explain the goals of network security Describe a layered approach to network defense Explain how network security defenses affect your organization

T

his chapter introduces you to the fundamental network security concepts you need to know. Some material might be a review for you, but it will serve to get you warmed up. To secure a network, understanding the TCP/IP protocol suite is vital. You review IP addressing briefly, and then move on to examining the “guts” of packets and seeing how attackers can use them to breach your network defenses. You also see how your knowledge of protocols can be used to block harmful communications. Next, you learn about different kinds of intruders and threats to network security, such as malicious code and natural disasters. Attackers have many motivations for hacking into networks, and your job is to figure out what they’re doing (before they do it, if possible) and to prevent them from carrying out their plans. When you’re warmed up, you’ll dive in to the goals of network security. You learn about the challenges of ensuring privacy, confidentiality, integrity, and availability for your network resources. Your organization’s security policy (covered in Chapters 2 and 3) is the first step toward defining specific security goals. After reviewing the basics, you’ll dig in to the real meat of network defense technologies. You discover how layering technologies can ensure better protection than any single technology used alone. The method of layering defenses is called defense in depth (DiD). Although you’ll probably encounter some concepts that seem overwhelming, don’t worry about that now. Ancient Techno-ese secrets will be shared, and you will soon know all.

Copyright © 2005 by Thomson Course Technology....