Introduction to Security Standards and Network Security and Firewalls
More companies are starting to rely extensively upon the Internet for commerce, communication, and collaboration.
Now, more than ever, the integrity of sensitive information and lines of communication is an all-important concern.
Responding to threats such as viruses and hackers is a critical part of any network administrator's job.
This module discusses security, security risks and standards, and gives you some guidelines for creating a security policy for your business.
By the end of this module, you will be able to:
Describe security and security statistics
Describe the types of security risks created by hackers
List the attributes of an effective security system
Describe security standards in current use
Plan a security policy for your business
Increase security effectiveness by establishing organizational training
Cybersecurity standards are techniques generally set forth in published materials that attempt to protect the cyber environment of a user or organization.
This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that
can be connected directly or indirectly to networks.
The principal objective is to reduce the risks, including prevention or mitigation of cybersecurity attacks.
These published materials consist of collections of
The choice between writing cybersecurity as two words (cyber security) or one (cybersecurity) depends on the institution.
The spelling in Europe tends to consist of two words.
- security safeguards,
- risk management approaches,
- best practices,
- assurance and technologies.