11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 16: Advanced Security 7Explain When and How to Use Security ApplicationSoftwareSecurity applications protect the operating system and software application data.The following products and software applications can be used to protect network devices:■■■Software firewall: Filters incoming data and is built into Windows XPIntrusion detection systems (IDS): Monitor and report on changes in program codeand unusual network activityApplication and OS patches: Update applications and the operating system to repairsecurity weaknesses that are discoveredSeveral software applications are available to protect computers from unauthorized accessby malicious computer code:■■■■Virus protectionSpyware protectionAdware protectionGrayware protectionIn small offices and homes, computers generally connect directly to the Internet rather thanthrough a protected LAN that organizations use. This puts computers outside of a LAN athigh risk for viruses and other attacks. At a minimum, these computers should use antivirusand antimalware protection programs. Application software and the operating system shouldbe updated with the latest patches. A software firewall can also be part of the solution.The security policy should determine the level of security applications put in place. Eachstep that increases protection costs money. In developing a policy, management should calculatethe cost of data loss versus the expense of security protection and determine whattrade-offs are acceptable.Select Security Components Based onCustomer NeedsThe security policy helps customers to select the security components necessary to keepequipment and data safe. If there is no security policy, you should discuss security issueswith the customer.Use your past experience as a technician and research the current security products on themarket when selecting security components for the customer. The goal is to provide thesecurity system that best matches the customer’s needs.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!