Security Standards  «Prev  Next»
Lesson 1

Introduction to Security Standards and Network Security and Firewalls

More companies are starting to rely extensively upon the Internet for commerce, communication, and collaboration.
Now, more than ever, the integrity of sensitive information and lines of communication is an all-important concern.
Responding to threats such as viruses and hackers is a critical part of any network administrator's job.
This module discusses security, security risks and standards, and gives you some guidelines for creating a security policy for your business.


By the end of this module, you will be able to:
  1. Describe security and security statistics
  2. Describe the types of security risks created by hackers
  3. List the attributes of an effective security system
  4. Describe security standards in current use
  5. Plan a security policy for your business
  6. Increase security effectiveness by establishing organizational training

Cybersecurity standards are techniques generally set forth in published materials that attempt to protect the cyber environment of a user or organization. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks. The principal objective is to reduce the risks, including prevention or mitigation of cybersecurity attacks. These published materials consist of collections of
  1. tools,
  2. policies,
  3. security safeguards,
  4. guidelines,
  5. risk management approaches,
  6. training,
  7. best practices,
  8. assurance and technologies.
The choice between writing cybersecurity as two words (cyber security) or one (cybersecurity) depends on the institution. The spelling in Europe tends to consist of two words.