About This Chapter
Network Security Overview: Chapter Summary
Network security is an essential component of the management and protection of computer networks. This chapter offers a thorough overview of network security fundamentals. Inside the chapter, you'll find lessons that examine various types of security networks. You'll learn about tools and procedures that test the security of a network, as well as the different types of security threats and vulnerabilities.
These lessons are designed to be simple, informative and engaging. This way, you can be sure you're quickly learning the material and retaining the information. Self-assessment quizzes are available to help you evaluate your understanding of these network security concepts.
After finishing the lessons in this chapter, you'll be able to:
- Define network security fundamentals
- Know how network security works
- Identify types of network security
- Determine the role of a firewall
- Recognize types of network security keys
- Understand non-repudiation
- Describe Wireless Protected Access (WPA)
- Compare WPA2 AES and TKIP
- Summarize WEP network security and Network Access Protection (NAP)
- Distinguish the best practices for securing a wireless network
- Analyze principles of network security design
- Assess network security risks, threats, vulnerabilities and types of attacks
- Outline the process and tools used for network security audits
- Remember network security policy procedures
- Evaluate the steps needed to test network security
- Explain the importance of network security
- Point out wireless network security issues and solutions
1. What is Network Security? - Definition & Fundamentals
This lesson offers a brief overview of network security fundamentals. We'll define the basic definition of network security and cover the scope of the field.
2. How Does Network Security Work?
This lesson will define network security and explain a little about how it works. We will also discuss the kinds of threats that networks face and what's at risk if the security fails.
3. Types of Network Security
Network security is a fundamental concept that is essential to any company using information technology. This lesson lists a few of the common types of network security systems and describes their role on the network.
4. What is a Firewall in Network Security? - Role & Use
The network firewall is an important piece of equipment that protects your network from hackers and other cyber criminals. Its use is essential if your business is connected to the Internet, and it's highly recommended for residential users too.
5. What is a Network Security Key? - Definition & Types
Leaving things unlocked - even your digital assets - can lead to problems. In this lesson, we'll define what a network security key is and examine some of the different types. We'll also discuss how they're used.
6. What is Non-Repudiation in Network Security?
Non-repudiation in network security is the ability to prevent a denial in an electronic message or transaction. In this lesson, you'll learn more about non-repudiation tools.
7. What is Wireless Protected Access (WPA)?
Wi-Fi security has come a long way. Wireless Protected Access, or WPA, is currently what keeps our devices from being compromised. In this lesson, we'll look at what WPA is, its security features, and the differences between WPA Personal and WPA Enterprise.
8. WPA2 AES vs. TKIP
The old WEP standard has long been overtaken by WPA2 and its encryption standards. In this lesson, you'll learn about the differences between the AES and TKIP encryption standards and why AES is better than the older TKIP standard when setting up secure Wi-Fi networks.
9. What is WEP Network Security?
Wireless networks are pervasive these days. It's hard to imagine going anywhere in North America that doesn't have one. In this lesson, we'll take a look at one of the related security technologies WEP, and how it relates to networks.
10. What is Network Access Protection (NAP)?
In this lesson,we will be examining the vulnerabilities posed to a corporate network by remote connections and understand the role of Network Access Protection in remote authorised connections.
11. How to Secure a Wireless Network: Best Practices & Measures
Keeping your information safe starts with keeping a safe wireless network. In this lesson, we look at the best measures to keep WiFi networks secure, from simply encrypting data to restricting device access.
12. Network Security Design: Best Practices & Principles
Security is very important these days, and it starts at the network level. In this lesson, we'll take a look at network security, what it is, what network security design is, best practices, and some principles to follow.
13. Network Security Risk Assessment: Checklist & Methodology
Networks are the entry point for a lot of systems, and as such legitimate targets. In this lesson, we'll take a look at network security, what it is, a checklist for implementing it, and a methodology that can be followed.
14. Network Security Audit: Tools & Checklist
Networks are important tools in business today. In this lesson, we'll take a look at network security, audits, tools you might use in an audit, and a checklist for performing it.
15. What is a Network Security Policy? - Procedures & Examples
In most group activities, we use rules for common behavior. Using a network in a group setting is no different; there are rules for computer access in order to protect the data. In this lesson, we'll define what a network security policy is and discuss its usage.
16. How to Test Network Security
A network is the foundation of most businesses these days. In this lesson, we'll take a look at network security: what it is, how to test it, and some tools that can be used for testing.
17. Why is Network Security Important?
In this lesson, we seek to explain how network security affects everyone in their daily lives and why it is important that everyone thinks about their behaviors when interacting with information technology.
18. Wireless Network Security Issues & Solutions
Anything being broadcasted, such as data over a wireless network, can potentially be intercepted. In this lesson, we'll examine security for wireless networks and how data can be protected from theft and malicious use.
19. Network Security Threats: Types & Vulnerabilities
In this lesson, we will define networks, the social aspects of a network, and the three common network vulnerabilities that leave a network open to hostile attacks.
20. Types of Attacks in Network Security
Network security specialists must face a wide variety of threats to their data and devices. In this lesson, we'll look at a number of the different types of attacks that can occur.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.