248 Copyright Goodheart-Willcox Co., Inc. Pretests and posttests Vocabulary terms with e-flash cards and matching activities Self-assessment While studying, look for the activity icon for: Overview of Network Security and Network Threats Chapter 8 In 2016, Director of National Intelligence James Clapper warned Congress that the next biggest threats to businesses would be hackers getting into networks and changing data. These actions would destroy the integrity of the data. Thus far, most cyberattacks have not been focused on data sabotage. Attacks that steal data, such as sensitive customer information, affect the confi dentiality of the infor- mation. Denial of service attacks make data unavailable. However, attacks that sabotage data have occurred. Some businesses have reported their data have been altered, and management made business decisions based on the faulty data. Security professionals must take all precautions and actively explore all pos- sible threats to prevent attacks against networks. To do this, you must be able to understand networking addresses and know how to view the content, such as the headers of network packets. You must also understand specifi c aspects of the TCP/IP protocol suite. This chapter explores security threats that involve the net- work traffi c and threats involving the TCP/IP protocol. Chapter Preview Section 8.1 Network Basics Section 8.2 Network Threats
Previous Page Next Page