Like this CertiGuide? Get it in PDF format!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

NEW! Network+ N11-003 2005 Beta Exam Study Guide - Just $9!
Get It Here!

Custom Search

Table Of Contents  CertiGuide to Network+
 9  Chapter 1000:  Security in the Real World

Previous Topic/Section
Chapter 1000:  Security in the Real World
Previous Page
Pages in Current Topic/Section
Next Page
II  Minimizing Risk
Next Topic/Section

I  Concepts & Terms Required - Chapter 1000

The consideration of Security should be the most critical topic when discussing networking. And when we say security, we don’t just mean protection against system intruders, but protection against all events that pose a risk to the company’s data or IT operations. The total value of all the capitol expenditures charged against the IT (Information Technology) budget is nothing compared to the value of the ‘crown jewels’ of a firm. That is the information that keeps the business functioning. While some areas of security are carefully addressed, all too often other areas are lacking. What makes it worse is the fact that it frequently is a taboo topic, as if we don’t talk about it, maybe it will go away. This is a foolish fantasy. Remember Melissa or the Love virus? You need to remember to be ever vigilant.

While the security needs of each company varies and sets its own particular access policies, the challenge lies in finding the sweet spot. Security that is too lax, and you are only keeping out amateur or casual break in attempts. Make security too restrictive, and users cannot perform useful work, and circumvent ‘well planned’ security by leaving passwords and keys accessible. For the purposes of the NETWORK+ test, several areas are testable, and you will see each of them in this chapter.

  • Understand the different aspects of network security

  • Share-level vs. User-level file sharing security

  • Know the security features in Windows NT and Novell Netware

  • Understand the security considerations involving passwords

  • Understand computer viruses and how anti-virus software is used to prevent them from spreading

  • Know the purpose of data encryption and the characteristics of common encryption methods

  • Know the purpose and features of firewalls, IP proxy services and application proxy services

  • Understand the areas of security concern for an Internet web server
Definitions You Need To Know

ACL (Access Control List)
Anti-Virus Software
Application Proxy
Data encryption
Defining and maintaining a security model
Disaster Recovery
Effective passwords and procedures
Fault Tolerance
Federated Identity
IP Proxy
LSA (Local Security Authority)
SAM (Security Accounts Manager)
Security models
Single Sign On
SRM (Security Reference Monitor)
SSL (Secure Sockets Layer)
User level security and Share level security

Previous Topic/Section
Chapter 1000:  Security in the Real World
Previous Page
Pages in Current Topic/Section
Next Page
II  Minimizing Risk
Next Topic/Section

If you find useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Network+ from (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $

Home - Table Of Contents - Contact Us

CertiGuide for Network+ ( on
Version 1.0 - Version Date: November 7, 2004

Adapted with permission from a work created by Tcat Houser and Helen O’Boyle. Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.