Skip to main content

Solution Manual For Computer Security Fundamentals, 5th Edition by William Chuck Easttom Chapter 1-1

Page 1

Solution Manual For Computer Security Fundamentals, 5th edition William Chuck Easttom COMPUTER SECURITY FUNDAMENTALS, 5E CHAPTER 1-15

CHAPTER 1 INTRODUCTION TO COMPUTER SECURITY

CHAPTER 1 OBJECTIVES When students finish reading this chapter, they will be able to: 

Identify the top threats to a network: security breaches, denial of service attacks, and malware

Understand essential security concepts

Assess the likelihood of an attack on a network

Define key terms such as cracker, penetration tester, firewall, and authentication

Compare and contrast perimeter and layered approaches to network security

Use online resources to secure a network

CHAPTER OVERVIEW This chapter introduces students to the actual threats posed to a network. It also gives a high-level overview of the entire textbook, introduces topics, and references detailed content covered in later chapters. This chapter introduces students to key terms, techniques, and network security resources. The major sections in this chapter are: 1.

How Seriously Should You Take Threats to Network Security? Realistically assesses the risks to your computer network.

2.

Identifying Types of Threats. Covers the common threats to a computer, including malware, security breaches, and denial of service attacks.

3.

Assessing the Likelihood of an Attack on Your Network. Reviews the dangers of attacks on computer networks.

4.

Basic Security Terminology. Presents definitions of the people, devices, activities, and basic paradigms involved in network security.

5.

Concepts and Approaches. Examines concepts and approaches to consider about security. 1


Turn static files into dynamic content formats.

Create a flipbook
Solution Manual For Computer Security Fundamentals, 5th Edition by William Chuck Easttom Chapter 1-1 by AnswerDone - Issuu