Chapter 1. Network Security Overview
On completing this chapter, you will be able to
- Define trust both in general terms and in terms of network resources
- Differentiate between the internal and external weaknesses and vulnerabilities of your security system
- Explain the difference between a hacker and a cracker
- Describe how responsibility for network security is commonly delegated within an organization
- Explain the CIA security model
- List some typical costs related to a network security system
With the rapid growth of interest in the Internet, network security has become more important. Currently, network administrators often spend more effort protecting their networks than they spend on the actual setup. They have to make the following determinations: Who will have access to data? What resources will users have access to? When will users access resources? Some of these decisions depend on the particular organization you are serving because some resources can be trusted more than others. Trust is discussed in the section that follows.