XII Chapter 1000: Summary
This chapter discusses various security considerations that a network manager needs to be aware of.
We discussed safeguarding data and IT operations through fault tolerance and disaster recovery.
Network resource security models include user-level and share-level security. Major network operating systems support one or both of these models. We discussed some of the security support in Windows NT and Novell Netware.
Passwords are used to control access to network resources. Gaining in importance are technologies that validate user identity without transmitting the user's password over the network, such as the PPP challenge-response authentication mechanism, or Kerberos.
When administering a network, one often concentrates on server security. It is important to not neglect client security, since a non-secure client system can allow an outsider to compromise your network. A specific area of client security concern is desktop remote access service (RAS).
Viruses are a growing threat to computer networks. Barely a week goes by without the latest virus making headlines. To protect against viruses, educate users to not open unexpected communications, and to use anti-virus software.
Encryption can help protect data stored on disk and traveling across a network from prying eyes. Network communications can be encrypted for the entire connection using a low-level protocol, or for only certain application conversations, using a higher level protocol like SSL for web-based transactions.
Firewalls are used to control movement of data into and out of a network. Firewall capabilities are often present in proxy servers and routers.
Internet web servers have their own set of security concerns. As with any corporate system accessible to the public, it is very important to keep the NOS software up to date and ensure that all available security patches have been applied.
Home - Table Of Contents - Contact Us
CertiGuide for Network+ (http://www.CertiGuide.com/netplus/) on CertiGuide.com
Version 1.0 - Version Date: November 7, 2004
Adapted with permission from a work created by Tcat Houser and Helen O’Boyle.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.