Network Security Illustrated buy the book at Amazon now!


search site
Table of Contents

Book
Introduction

Managing
Security

Outsourcing
Options

Reserving
Rights

Determining
Identity

Preserving
Privacy

Connecting
Networks

Hardening
Networks

Storing
Information

Hiding
Information

Accessing
Information

Ensuring
Availability

Detecting
Intrusions

Page Tools
print this pagePrint this Page
Connecting
Networks
Chapter List
Networking Hardware
Wireless Connections
Networking Lingo
More Information
Resources (links)
Discussions
FAQs
Errata
Sample Pages
Buy The Book
at amazon.com

Summary

The tools used to build and connect networks are not always secure. Some are notoriously insecure (wireless). This chapter discusses issues and solutions for securing the basic components used to build and connect networks.

Key Points

  • Networking allows computer systems to share information across vast distances.

  • Network hardware is used in two different ways: connecting computers together and connecting networks together. Critical differences exist in the security implications.
  • Specialized hardware enables networks to become large and complex by routing and controlling massive amounts of data.
  • Securing data over networks is far more complicated than keeping isolated data secure. Securing data over wireless networks is more complicated than doing so over traditional wired networks.
  • Numerous common security problems are the direct result of poor network design.

Connections

A number of technologies can be used to connect networks. Each technology has its security benefits and detriments. Although the tools themselves are relatively simple, many ways to mix and match the components are available. The interactions between devices create additional, unique security issues. In order to effectively evaluate the security of a network design, one must understand the components and how they interact.
  • Networking Hardware describes how hubs, routers, and switches are the three basic “joints” used to connect computers and networks together.

  • Wireless Connections explains the use of radio waves and signal processing to connect systems and networks without the encumbrance of wires.

  • Networking Lingo covers the basic languages that network systems and applications use when interacting and transferring data.

More Information

The above information is an excerpt from "Network Security Illustrated," published by McGraw-Hill and available from amazon.com, as well as your local bookstore. The book goes into much greater depth on this topic. To learn more about the book and what it covers, click here.

Below, you'll find links to online resources that supplement this portion of the book.


Resources

(websites, books, etc.)

Discussions

FAQs

Errata

Sample Pages