Đang chuẩn bị liên kết để tải về tài liệu:
Lecture Business data communications and networking (8e): Chapter 11 - Jerry Fitzgerald, Alan Dennis

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

Chapter 11 - Network security. In this chapter, the following content will be discussed: Introduction; risk assessment; controlling disruption, destruction and disaster; controlling unauthorized access; best practice recommendations. | Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Prof. M. Ulema Manhattan College Computer Information Systems 11 - Copyright 2005 John Wiley & Sons, Inc Chapter 11 Network Security 11 - Copyright 2005 John Wiley & Sons, Inc Outline Introduction Risk assessment Controlling disruption, destruction and disaster Controlling unauthorized access Preventing, detecting, and correcting Unauthorized Access Best practice recommendations 11 - Copyright 2005 John Wiley & Sons, Inc Introduction Security - always a major business concern Protection of physical assets with locks, barriers, guards, etc Protection of information with passwords, coding Introduction of computers and Internet Redefined the nature of information security Laws and enforcement Slow to catch-up Now a federal crime in the U.S. (breaking into a computer) New laws against cyberborder crimes; difficult to enforce 11 - Copyright 2005 John Wiley & | Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Prof. M. Ulema Manhattan College Computer Information Systems 11 - Copyright 2005 John Wiley & Sons, Inc Chapter 11 Network Security 11 - Copyright 2005 John Wiley & Sons, Inc Outline Introduction Risk assessment Controlling disruption, destruction and disaster Controlling unauthorized access Preventing, detecting, and correcting Unauthorized Access Best practice recommendations 11 - Copyright 2005 John Wiley & Sons, Inc Introduction Security - always a major business concern Protection of physical assets with locks, barriers, guards, etc Protection of information with passwords, coding Introduction of computers and Internet Redefined the nature of information security Laws and enforcement Slow to catch-up Now a federal crime in the U.S. (breaking into a computer) New laws against cyberborder crimes; difficult to enforce 11 - Copyright 2005 John Wiley & Sons, Inc Computer Security Incidents Growing at a rate of 100% per year 1988: a virus shut down 10% of the computers on the Internet Establishment of Computer Emergency Response Team (CERT) with US DoD support Number of Incidents Reported to CERT 11 - Copyright 2005 John Wiley & Sons, Inc Financial Impact of Security 2003 Computer Security Institute/FBI Computer Crime and Security Survey 90% of the respondents reported security breaches in the last 12 months 75% reported a financial loss due to security breaches Average loss: $2 million Worldwide total annual cost of security losses Exceeds $2 trillion Reason for the increase in security problems Availability of sophisticated tools to break into networks 11 - Copyright 2005 John Wiley & Sons, Inc Why Networks Need Security Organizations becoming vulnerable Becoming increasingly dependent on computers, networks Becoming increasingly vulnerable to due widely available Internet access to its computers and networks Huge losses .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.