• Security + Certification - Chapter 12: Policies and Disaster Recovery - AthenaSecurity + Certification - Chapter 12: Policies and Disaster Recovery - Athena

    Policies, procedures, documentation, and disaster recovery are some of the most important parts of a Security Analyst’s job.  Privilege management allows you to control access through various methods, and is a primary feature of good security  Education and documentation are two extremely important topics as part of security  Business c...

    pdf45 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 663 | Lượt tải: 0

  • Security + Certification - Chapter 11: Incident Response - AthenaSecurity + Certification - Chapter 11: Incident Response - Athena

    Incident Response – Why is it Critical?  Resolve the problem • Find out what happened • How it happened • Who did it  Create a record of the incident for later use  Create a record to observe trends  Create a record to improve processes  Avoid confusion Elements of Incident Response  Preparation  Identification  Containment  ...

    pdf90 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 704 | Lượt tải: 0

  • Security + Certification - Chapter 10: Public Key Infrastructure - AthenaSecurity + Certification - Chapter 10: Public Key Infrastructure - Athena

    Understanding Cryptography Strengths and Vulnerabilities  Cryptography is science of “scrambling” data so it cannot be viewed by unauthorized users, making it secure while being transmitted or stored  When the recipient receives encrypted text or another user wants to access stored information, it must be decrypted with the cipher and ke...

    pdf34 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 692 | Lượt tải: 0

  • Security + Certification - Chapter 9: System Hardening - AthenaSecurity + Certification - Chapter 9: System Hardening - Athena

    Disabling Nonessential Systems  First step in establishing a defense against computer attacks is to turn off all nonessential systems  The background program waits in the computer’s random access memory (RAM) until the user presses a specific combination of keys (a hot key), such as Ctrl+Shift+P  Then, the idling program springs to life ...

    pdf39 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 654 | Lượt tải: 0

  • Security + Certification - Chapter 8: Network Security Topologies - AthenaSecurity + Certification - Chapter 8: Network Security Topologies - Athena

    The whole goal of connecting networks is so that people can share information.  The goal of perimeter security is to selectively admit or deny data flows based on: • Protocol • Source • Destination • Content Put in place using firewalls and routers on network edge  Permit secure communications between the organization and third parties ...

    pdf40 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 735 | Lượt tải: 0

  • Security + Certification - Chapter 7: Security Administration for the System - AthenaSecurity + Certification - Chapter 7: Security Administration for the System - Athena

    Firewalls  Hardware or software devices that provides a means of securing a computer or network from unwanted intrusion • Dedicated physical device that protects network from intrusion • Software feature added to a router, switch, or other device that prevents traffic to or from part of a network Three firewall technolog  Packet filteri...

    pdf76 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 687 | Lượt tải: 0

  • Security + Certification - Chapter 6: Email and Web Security - AthenaSecurity + Certification - Chapter 6: Email and Web Security - Athena

    Protect e-mail systems  List World Wide Web vulnerabilities  Secure Web communications  Secure instant messaging Protecting E-Mail Systems E-mail has replaced the fax machine as the primary communication tool for businesses  Has also become a prime target of attackers and must be protected Use two Transmission Control Protocol/Interne...

    pdf48 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 694 | Lượt tải: 0

  • Security + Certification - Chapter 5: Wireless Security - AthenaSecurity + Certification - Chapter 5: Wireless Security - Athena

    Wireless Application Protocol (WAP) Provides standard way to transmit, format, and display Internet data for devices such as cell phones  A WAP cell phone runs a microbrowser that uses Wireless Markup Language (WML) instead of HTML • WML is designed to display text-based Web content on the small screen of a cell phone • Because the Intern...

    pdf20 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 622 | Lượt tải: 0

  • Security + Certification - Chapter 4: Remote Access - AthenaSecurity + Certification - Chapter 4: Remote Access - Athena

    Users needing access to networks from remote locations is increasing, along with the associated security issues.  The need to identify who is trying to access a specific port on a network has lead to the development of the 802.1x standard. Users needing access to networks from remote locations is increasing, along with the associated secur...

    pdf54 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 743 | Lượt tải: 0

  • Bài giảng Mã hóa và an ninh mạng - Chương 1: Mở đầuBài giảng Mã hóa và an ninh mạng - Chương 1: Mở đầu

    an ninh máy tính: tập hợp các công cụ được thiết kế để bảo vệ dữ liệu và chống hackers  an ninh mạng: các phương tiện bảo vệ dữ liệu khi truyền chúng  an ninh Internet: các phương tiện bảo vệ dữ liệu khi truyền chúng trên tập các mạng liên kết với nhau

    pdf27 trang | Chia sẻ: candy98 | Ngày: 27/11/2020 | Lượt xem: 893 | Lượt tải: 1