Copyright Goodheart-Willcox Co., Inc. 490 Networking Fundamentals ■ Physical security of a network refers to the location of the physical, tangible system components. ■ Workstations, server rooms, and any access point should be secured, and devices should have tamper protection. ■ Biometrics is the use of physical characteristics for the basis of user authentication. ■ A smart card integrates electronics into a card for authentication. Security Tools ■ Th e netstat utility can help determine which ports are open on a computer. ■ A protocol analyzer is a tool that inspects protocol activity and contents. ■ A packet sniff er is a type of network monitoring utility that inspects data packets. ■ Policies and procedures should outline security measures, including re- mote access guidelines, best practices and safety guidelines, BYOD rules, an acceptable use policy (AUP), proper disposal of equipment, data loss preven- tion, and incident response. Data Security Compliance Requirements ■ Th e diff erence between a standard and a law is that a standard is voluntary, whereas a law is legally binding. Review Questions 1. Summarize the diff erences between the three basic types of hackers. 2. _____ is the process used to identify a user and ensure the user is who he or she claims to be. 3. _____ is a method of using an algorithm to encode data. 4. Th e manipulation of personnel through deceitful means to gain security information is called _____. 5. When a server is overloaded with false requests so much that it crashes, what type of attack has occurred? 6. What is using a false IP address or identity called? 7. What is the purpose behind using a Trojan horse? 8. Where are macro writers commonly found? 9. Th rough what method are worms typically spread? 10. Describe DNS poisoning. 11. What is the purpose of intrusion detection and intrusion prevention systems? 12. What is the diff erence between symmetric-key encryption and asymmetric- key encryption? 13. Another name for symmetric-key encryption is _____. 14. List three examples of symmetric cyphers.