About This Chapter
Monitoring & Protecting the Network - Chapter Summary
Although technology has made our lives easier, that same technology has also put us at the risk of having our personal information stolen or misused. In this chapter you will learn about monitoring and protecting information networks. Each lesson focuses on a different aspect of Internet security, with discussions about proactive approaches, professional monitoring practices, and other security tools. As this topic covers a wide range of information, you may only need assistance in certain areas, and you have the option to go through any of these lessons in any order. Furthermore, you can always go back to a lesson if you need a recap. Once you have mastered everything in this chapter, you should feel confident enough to do the following:
- Describe the tools used for computer management
- Identify fundamental encryption methods
- Analyze data redundancy and RAID arrays
- Check out the requirements for tier 4 data centers
- Compare throughput vs. bandwidth
- Distinguish between throughput and latency
- Define the significance of information security
- Examine the Federal Information Security Management Act
- Explain the devices and solutions of a security perimeter
- Point out examples of cyber crimes
- Appraise the essentials of Internet security
- Assess various kinds of malware and antivirus software
- Summarize biometrics, passwords, encryption, and firewalls
- Critique the role of the firewall within network security
1. What Is Computer Management? - Maintenance & Tools
A computer needs to be maintained in order to keep working properly. Learn about maintenance tasks, such as backing up your files, running antivirus software, installing software updates and using disk tools.
2. Basic Encryption Methods
Now more than ever, encryption has become central to security and privacy, helping protect the data of individuals and corporations alike. In this lesson, we'll learn what exactly encryption is, basic encryption methods and the qualities of strong encryption.
3. RAID Arrays & Data Redundancy
RAID uses multiple hard disk drives to improve the reliability and performance of data storage. Learn how RAID provides data redundancy to protect against hard disk drive failures.
4. What is a Tier 4 Data Center? - Requirements & Design
This lesson will cover the requirements and design necessary for a Tier 4 Data Center. Organizations rely on their data and cannot afford to have outages. A Tier 4 data center is the most robust and reliable.
5. Bandwidth vs. Throughput
This lesson is about two similar concepts - bandwidth and throughput. These two concepts will be described and compared to get an idea of how these apply to things like speed on a home network.
6. Throughput vs. Latency
The actual speed of data on a network can be described by words like 'throughput' and 'latency.' In this lesson, we will define both of these words, and see how they help fulfill the demand for data on a network.
7. Importance of Information Security
Information security (InfoSec) is the practice of protecting information while still providing access to those who need it. Learn about the three principles that are the foundation of good InfoSec.
8. What is The Federal Information Security Management Act?
Security breaches do not occur only at a personal level but at a national level as well. In this lesson, you'll learn about the Federal Information Security Management Act, which determines what each federal agency must do to reduce the risk of a security breach.
9. Security Perimeter: Definition, Solutions & Devices
In this lesson, you will learn the definition of security perimeter. Additionally, you will learn about the devices, equipment, and technologies used to secure a network's perimeter.
10. What Is Cyber Crime? - Definition, Types & Examples
In this lesson, we will learn about cyber crimes. We will look at what these crimes are and what they mean. Then, we will take a closer look at some specific examples.
11. What is Internet Security? - Privacy, Protection & Essentials
The Internet provides a wealth of information and services, but also presents certain risks. Learn about the various security threats and way to make your online activities more secure and enjoyable.
12. What is Malware? - Definition, Examples & Types
Viruses, worms, spyware, adware, hijackers, and Trojans. What do all of these things have in common? They're all forms of malware. In this lesson, we'll define malware and discuss some common types and examples.
13. What is Antivirus Software? - Examples & Overview
Antivirus software looks for computer viruses and other malware (a program with bad intent) trying to enter your computer and treats them if they are detected. This lesson provides an overview of how antivirus software works, discusses the kinds of things it is trying to protect against, and gives examples of antivirus products.
14. Systems Security: Firewalls, Encryption, Passwords & Biometrics
Computer systems face a number of security threats. Learn about different approaches to system security, including firewalls, data encryption, passwords and biometrics.
15. What is a Firewall in Network Security? - Role & Use
The network firewall is an important piece of equipment that protects your network from hackers and other cyber criminals. Its use is essential if your business is connected to the Internet, and it's highly recommended for residential users too.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.