Network Security Fundamentals [Electronic resources]

Gert De Laet, Gert Schauwers

نسخه متنی -صفحه : 196/ 12
نمايش فراداده

Chapter 1. Network Security Overview

On completing this chapter, you will be able to

  • Define trust both in general terms and in terms of network resources

  • Differentiate between the internal and external weaknesses and vulnerabilities of your security system

  • Explain the difference between a hacker and a cracker

  • Describe how responsibility for network security is commonly delegated within an organization

  • Explain the CIA security model

  • List some typical costs related to a network security system

With the rapid growth of interest in the Internet, network security has become more important. Currently, network administrators often spend more effort protecting their networks than they spend on the actual setup. They have to make the following determinations: Who will have access to data? What resources will users have access to? When will users access resources? Some of these decisions depend on the particular organization you are serving because some resources can be trusted more than others. Trust is discussed in the section that follows.