Warning:
JavaScript is turned OFF. None of the links on this page will work until it is reactivated.
If you need help turning JavaScript On, click here.
The Concept Map you are trying to access has information related to:
Chapter 7 Security Areas, Security Areas Network Security Protecting network & telecommunications equipment, protecting network servers and transmissions, combatting eavesdropping, controlling access from untrusted networks, firewalls, and detecting intrusions, Security Areas Network Security Is different from system security since the attacker is mainly interested in: Sniffing, Snooping, Sweeping, or just plain looking around in order to gain information about a computing infrastructure, Security Areas System Security User access and authentication controls, assignment of privilege, maintaing file and filesystem integrity, backups, monitoring processes, log-keeping, and auditing