Chapter 3. Understanding Defenses
On completing this chapter, you will be able to
Explain how digital IDs can protect a network
Describe intrusion protection and intrusion prevention techniques
Explain how PC card–based solutions can counter network weaknesses
Explain how different encryption techniques protect a network environment
Describe physical security of a site that uses access control and biometric techniques
Explain how antivirus software is used
List the basic functions of a firewall
Immense numbers of tools, techniques, systems, services, and processes are available to protect your data in today's challenging network environment. This chapter presents an overview of the techniques used to counter the network weaknesses discussed in Chapter ...
Get Network Security Fundamentals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.