Chapter Security
9 Introduction
Study to
Guide
Network
Chapter
with Security
Key
9 Introduction
Concepts
Study to
and
Guide
Network
Practice
with Security
Key
Questions.pdf
Concepts
Study and
Guide
Practice
with Key
Questions.pdf
Concepts and Practice Questions.pdf
Chapter 9
Introduction to
Network Security
Study Guide with
Key Concepts and
Practice Questions
Chapter 9 Introduction to Network
Chapter Security
9 Introduction
Study to
Guide
Network
with
Chapter
Security
Key 9Concepts
Introduction
Study and
Guide
to
Practice
Network
with Key
Questions.pdf
Security
ConceptsStudy
and Guide
Practice
with
Questions.pdf
Key Concepts and Practice Questions
,Ch. 9_ Introduction to Network Security.pdf Ch. 9_ Introduction to Network Security.pdf Ch. 9_ Introduction to Network Security.pdf
What is a network security policy? A written document describing rules for access to a company's info resources,
enforcement of these rules, and steps taken if rules are breached
What should a security policy be easy for ordinary users Understand and reasonably comply with.
to do?
What is an example of a requirement for a security policy You shouldn't forbid Internet use during a certain time of day unless you have a
to be enforceable? method of monitoring or restricting this use.
What should a security policy clearly state? The objective of each policy so that everyone understands its purpose.
Privacy Policy Describes what staff, customers, and business partners can expect for monitoring
and reporting ex. Someone can read someone else's email
Acceptable use policy Explains for what purposes network resources can be used
Authentication policy Describes how users identify themselves to gain access to network resources
•How to log in
Internet use policy Explains what constitutes proper or improper use of Internet resources
Ch. 9_ Introduction to Network Security.pdf Ch. 9_ Introduction to Network Security.pdf Ch. 9_ Introduction to Network Security
, Ch. 9_ Introduction to Network Security.pdf Ch. 9_ Introduction to Network Security.pdf Ch. 9_ Introduction to Network Security.pdf
Important question regarding determining the level of -What costs are associated with security being breached and data being lost or
security you network needs: stolen?
•How valuable is a data????????
-Less data=cheaper
-More data=pricy
What are features of highly restrictive security policies? Data encryption, complex password requirements, detailed auditing and
monitoring, intricate authentication methods, and policies governing Internet and
e-mail use.
What is a disadvantage of highly restrictive security They are expensive to implement and support.
policies?
What type of security policies do most companies Moderately Restrictive Security Policies
implement?
What is a requirement for user access in moderately Require passwords for each user but not overly complex
restrictive security policies?
What is the value of data in companies with moderately Medium data valuable
restrictive security policies?
Ch. 9_ Introduction to Network Security.pdf Ch. 9_ Introduction to Network Security.pdf Ch. 9_ Introduction to Network Security