Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید


Chapter 1. Network Security Overview


On completing this chapter, you will be able to

  • Define trust both in general terms and in terms of network resources

  • Differentiate between the internal and external weaknesses and vulnerabilities of your security system

  • Explain the difference between a hacker and a cracker

  • Describe how responsibility for network security is commonly delegated within an organization

  • Explain the CIA security model

  • List some typical costs related to a network security system


With the rapid growth of interest in the Internet, network security has become more important. Currently, network administrators often spend more effort protecting their networks than they spend on the actual setup. They have to make the following determinations: Who will have access to data? What resources will users have access to? When will users access resources? Some of these decisions depend on the particular organization you are serving because some resources can be trusted more than others. Trust is discussed in the section that follows.

/ 196