ITM 600 Chapter Notes - Chapter 8: Password Policy, Network Administrator, Fast User Switching

54 views13 pages

Document Summary

Breaking down the process of security design into the following steps will help you effectively plan and execute a security strategy: Identify network assets and the risks if those assets could be sabotaged or inappropriately accessed. Network devices include: network hosts (computers, os, applications, data), interworking devices (switches and routers), intellectual property, trade secrets, and company reputation. Risks can range from hostile intruders to employees downloading a virus: hostile intruders steal data, change data and cause denial of service attacks. The confidentiality of data, so that only authorized users can view sensitive information. The integrity of data, so that only authorized users can change sensitive information. System and data availability, so that users have uninterrupted access to important computing resources: the cost of protecting yourself against a threat should be less than the cost of recovering if the threat were to strike you. Trade-offs must be made between security gaols and goals for affordability, usability, performance, and availability.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents