11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 9Fundamental SecurityObjectivesUpon completion of this chapter, you should be able to answer the following questions:■■■Why is security important?What are security threats?What are some security procedures?Key Terms■■What are the preventive maintenance techniquesfor security?What can be done to troubleshoot security?This chapter uses the following key terms. You can find the definitions in the Glossary.malicious threat page xxaccidental threat page xxvirus page xxworm page xxTrojan horse page xxvirus protection software page xxantivirus software page xxsecurity policy page xxweb security page xxActiveX page xxJava page xxJavaScript page xxadware page xxgrayware page xxmalware page xxspyware page xxsocial engineering page xxdenial of service (DoS) page xxping of death page xxe-mail bomb page xxdistributed DoS (DDoS) page xxspam page xxpopup page xxSYN flood page xxspoofing page xxreplay page xxDNS poisoning page xxcard key page xxbiometric page xxpassword protection page xxdata encryption page xxport protection page xxcontinues

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!