Copyright

Ch 7: Monitoring & Protecting the Network

About This Chapter

Decipher the significance of monitoring and protecting networks with this insightful chapter. If you need to improve your grades in your networking course, these lessons can provide you with supplemental materials that will help you understand more about information system security protocols.

Monitoring & Protecting the Network - Chapter Summary

Although technology has made our lives easier, that same technology has also put us at the risk of having our personal information stolen or misused. In this chapter you will learn about monitoring and protecting information networks. Each lesson focuses on a different aspect of Internet security, with discussions about proactive approaches, professional monitoring practices, and other security tools. As this topic covers a wide range of information, you may only need assistance in certain areas, and you have the option to go through any of these lessons in any order. Furthermore, you can always go back to a lesson if you need a recap. Once you have mastered everything in this chapter, you should feel confident enough to do the following:

  • Describe the tools used for computer management
  • Identify fundamental encryption methods
  • Analyze data redundancy and RAID arrays
  • Check out the requirements for tier 4 data centers
  • Compare throughput vs. bandwidth
  • Distinguish between throughput and latency
  • Define the significance of information security
  • Examine the Federal Information Security Management Act
  • Explain the devices and solutions of a security perimeter
  • Point out examples of cyber crimes
  • Appraise the essentials of Internet security
  • Assess various kinds of malware and antivirus software
  • Summarize biometrics, passwords, encryption, and firewalls
  • Critique the role of the firewall within network security

15 Lessons in Chapter 7: Monitoring & Protecting the Network
Test your knowledge with a 30-question chapter practice test
What Is Computer Management? - Maintenance & Tools

1. What Is Computer Management? - Maintenance & Tools

A computer needs to be maintained in order to keep working properly. Learn about maintenance tasks, such as backing up your files, running antivirus software, installing software updates and using disk tools.

Basic Encryption Methods

2. Basic Encryption Methods

Now more than ever, encryption has become central to security and privacy, helping protect the data of individuals and corporations alike. In this lesson, we'll learn what exactly encryption is, basic encryption methods and the qualities of strong encryption.

RAID Arrays & Data Redundancy

3. RAID Arrays & Data Redundancy

RAID uses multiple hard disk drives to improve the reliability and performance of data storage. Learn how RAID provides data redundancy to protect against hard disk drive failures.

What is a Tier 4 Data Center? - Requirements & Design

4. What is a Tier 4 Data Center? - Requirements & Design

This lesson will cover the requirements and design necessary for a Tier 4 Data Center. Organizations rely on their data and cannot afford to have outages. A Tier 4 data center is the most robust and reliable.

Bandwidth vs. Throughput

5. Bandwidth vs. Throughput

This lesson is about two similar concepts - bandwidth and throughput. These two concepts will be described and compared to get an idea of how these apply to things like speed on a home network.

Throughput vs. Latency

6. Throughput vs. Latency

The actual speed of data on a network can be described by words like 'throughput' and 'latency.' In this lesson, we will define both of these words, and see how they help fulfill the demand for data on a network.

Importance of Information Security

7. Importance of Information Security

Information security (InfoSec) is the practice of protecting information while still providing access to those who need it. Learn about the three principles that are the foundation of good InfoSec.

What is The Federal Information Security Management Act?

8. What is The Federal Information Security Management Act?

Security breaches do not occur only at a personal level but at a national level as well. In this lesson, you'll learn about the Federal Information Security Management Act, which determines what each federal agency must do to reduce the risk of a security breach.

Security Perimeter: Definition, Solutions & Devices

9. Security Perimeter: Definition, Solutions & Devices

In this lesson, you will learn the definition of security perimeter. Additionally, you will learn about the devices, equipment, and technologies used to secure a network's perimeter.

What Is Cyber Crime? - Definition, Types & Examples

10. What Is Cyber Crime? - Definition, Types & Examples

In this lesson, we will learn about cyber crimes. We will look at what these crimes are and what they mean. Then, we will take a closer look at some specific examples.

What is Internet Security? - Privacy, Protection & Essentials

11. What is Internet Security? - Privacy, Protection & Essentials

The Internet provides a wealth of information and services, but also presents certain risks. Learn about the various security threats and way to make your online activities more secure and enjoyable.

What is Malware? - Definition, Examples & Types

12. What is Malware? - Definition, Examples & Types

Viruses, worms, spyware, adware, hijackers, and Trojans. What do all of these things have in common? They're all forms of malware. In this lesson, we'll define malware and discuss some common types and examples.

What is Antivirus Software? - Examples & Overview

13. What is Antivirus Software? - Examples & Overview

Antivirus software looks for computer viruses and other malware (a program with bad intent) trying to enter your computer and treats them if they are detected. This lesson provides an overview of how antivirus software works, discusses the kinds of things it is trying to protect against, and gives examples of antivirus products.

Systems Security: Firewalls, Encryption, Passwords & Biometrics

14. Systems Security: Firewalls, Encryption, Passwords & Biometrics

Computer systems face a number of security threats. Learn about different approaches to system security, including firewalls, data encryption, passwords and biometrics.

What is a Firewall in Network Security? - Role & Use

15. What is a Firewall in Network Security? - Role & Use

The network firewall is an important piece of equipment that protects your network from hackers and other cyber criminals. Its use is essential if your business is connected to the Internet, and it's highly recommended for residential users too.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support