Safeguard Network  «Prev  Next»
Lesson 13

Secure Systems Conclusion

This module pinpointed the main tools, techniques, and requirements used to secure Internet, intranet, and extranet systems from suspicious activities. By now, you should be able to:
  1. Explain the need for security
  2. Identify the characteristics of a good security plan
  3. Explain the basic methods used to keep connections to the Internet secure
  4. Describe the differences between the security needs for the Internet, intranets, and extranets
  5. Describe the various types of attacks that an Internet server is vulnerable to
  6. Describe the various types of technologies available to counteract server attacks

Glossary

In this module, you were introduced to the following terms:
  1. Access control: The basic purpose of access control is to monitor access to information and sites.
  2. Firewall: Network security device that blocks a specific type of data or prevents data from specified sources from entering the network.
  3. Encryption: The process of disguising information to make it unreadable.
  4. Public-key encryption: A means to ensure user authorization. Public-key encryption has two keys: one to encrypt the material, the other to decrypt it.
  5. Secure Electronic Transactions (SET): A standard enabling secure credit card transactions on the Internet.
  6. Secure Sockets Layer (SSL): A protocol for secure network communications using a combination of public and secret key technology.
  7. Auditing: Reading and interpreting log files to identify hacker activity.
  8. Authentication: Proof that the user is who they claim to be. Generally achieved through a Digital Signature and validated through a Certificate Authority.
  9. Virtual Private Network (VPN): An alternative to a WAN that uses special software on client computers to connect across an intranet or the Internet to special software on a dedicated server.
  10. Non-repudiation: A service that documents the identities of both the sender and receiver of a data transmission so that neither can deny sending/receiving the message.
The next module is the course wrap-up.

Security Issues - Quiz

Click the Quiz link below to test your knowledge of security issues.
Security Issues - Quiz

Security Measures

Click the link below to read about security measures.
Security Measures