About This Chapter
Network Security & Policies - Chapter Summary
In this engaging chapter you'll find bite-sized lessons you can review at your convenience to learn about or get reacquainted with network security and related policies. By exploring this chapter, you can enhance your understanding of wireless network security issues and solutions, network security threats, routing and switching and more. As you progress through the lessons, gauge your knowledge of key concepts by taking mini quizzes and a broader chapter exam. Any lesson topic questions that arise during your studies can be submitted to our experts via the dashboard. Around-the-clock mobile access lets you study during the timeframes and in the locations that suit your schedule. Upon completion of this chapter, you will be able to:
- Define and discuss the fundamentals of network security
- List and describe types of network security
- Explain the role and use of a firewall in network security
- Share best practices and principles in network security design
- Differentiate between IPSec and SSL
- Describe the checklist and methodology for network security risk assessment
- Discuss the tools and checklist for a network security audit
- Provide examples of a network security policy
- Detail how to test network security
1. What is Network Security? - Definition & Fundamentals
This lesson offers a brief overview of network security fundamentals. We'll define the basic definition of network security and cover the scope of the field.
2. Types of Network Security
Network security is a fundamental concept that is essential to any company using information technology. This lesson lists a few of the common types of network security systems and describes their role on the network.
3. What is a Firewall in Network Security? - Role & Use
The network firewall is an important piece of equipment that protects your network from hackers and other cyber criminals. Its use is essential if your business is connected to the Internet, and it's highly recommended for residential users too.
4. Routing & Switching: Security Issues & Solutions
In this lesson, you will learn about some of the common security issues found in routers and switches. Furthermore, you will learn how to mitigate these security issues in order to create a more robust network.
5. Network Security Design: Best Practices & Principles
Security is very important these days, and it starts at the network level. In this lesson, we'll take a look at network security, what it is, what network security design is, best practices, and some principles to follow.
6. IPsec vs. SSL
This lesson will cover two encryption methods used to secure data: IPSec and SSL. These methods are mainly used to allow connections to secure networks from otherwise insecure sources.
7. Network Security Risk Assessment: Checklist & Methodology
Networks are the entry point for a lot of systems, and as such legitimate targets. In this lesson, we'll take a look at network security, what it is, a checklist for implementing it, and a methodology that can be followed.
8. Network Security Threats: Types & Vulnerabilities
In this lesson, we will define networks, the social aspects of a network, and the three common network vulnerabilities that leave a network open to hostile attacks.
9. Network Security Audit: Tools & Checklist
Networks are important tools in business today. In this lesson, we'll take a look at network security, audits, tools you might use in an audit, and a checklist for performing it.
10. What is a Network Security Policy? - Procedures & Examples
In most group activities, we use rules for common behavior. Using a network in a group setting is no different; there are rules for computer access in order to protect the data. In this lesson, we'll define what a network security policy is and discuss its usage.
11. How to Test Network Security
A network is the foundation of most businesses these days. In this lesson, we'll take a look at network security: what it is, how to test it, and some tools that can be used for testing.
12. Wireless Network Security Issues & Solutions
Anything being broadcasted, such as data over a wireless network, can potentially be intercepted. In this lesson, we'll examine security for wireless networks and how data can be protected from theft and malicious use.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 220: Fundamentals of Routing and Switching course