[Chapter 12] 12.9 Summary
Chapter 12Network Security 12.9 Summary Network access and computer security work at cross-purposes. Attaching
a computer to a network increases the security risks for that
computer. Evaluate your security needs to determine what must be
protected and how vigorously it must be protected. Develop a written
site security policy that defines your procedures and
documents the security duties and responsibilities of employees at all
levels.Network security is essentially good system security. Good user
authentication, effective system monitoring, and well-trained system
administrators provide the best security. Tools are available to help with
these tasks. SSH, OPIE, Tripwire, COPS, SATAN, TCP Wrapper, encryption,
and firewalls are all tools that can help.Like troubleshooting, network security is
an ongoing process. In the final chapter, we discuss another ongoing
process - learning. Now we look at ways you can keep abreast of the most
current information in network administration.12.8 Words to the Wise 13. Internet Information Resources [ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]
Wyszukiwarka
Podobne podstrony:
ch12ch12 (15)ch12 (16)ch12ch12ch12ch12ch12ch12ch12ch12ch12ch12ch12budynas SM ch12ch12CH12ch12 (3)więcej podobnych podstron