ch12 09


[Chapter 12] 12.9 Summary Chapter 12Network Security  12.9 Summary Network access and computer security work at cross-purposes. Attaching a computer to a network increases the security risks for that computer. Evaluate your security needs to determine what must be protected and how vigorously it must be protected. Develop a written site security policy that defines your procedures and documents the security duties and responsibilities of employees at all levels.Network security is essentially good system security. Good user authentication, effective system monitoring, and well-trained system administrators provide the best security. Tools are available to help with these tasks. SSH, OPIE, Tripwire, COPS, SATAN, TCP Wrapper, encryption, and firewalls are all tools that can help.Like troubleshooting, network security is an ongoing process. In the final chapter, we discuss another ongoing process - learning. Now we look at ways you can keep abreast of the most current information in network administration.12.8 Words to the Wise 13. Internet Information Resources [ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]

Wyszukiwarka

Podobne podstrony:
ch12
ch12 (15)
ch12 (16)
ch12
ch12
ch12
ch12
ch12
ch12
ch12
ch12
ch12
ch12
ch12
budynas SM ch12
ch12
CH12
ch12 (3)

więcej podobnych podstron