Chapter 4: Understanding Security Principles
On a network, there are many applications and network protocols. These are like the vehicles that transport our data from a source to a destination. While many of these network protocols are designed with good intentions to help users communicate and share resources, threat actors such as hackers use these protocols to distribute their malware and compromise other systems on a network. As an upcoming cybersecurity professional, it's important you understand the challenges security professionals experience when networking technologies change various aspects of data types as messages are passed between networks.
Throughout this chapter, you will learn about the pillars of information security and how they are used within any organization, be it large or small, to create a secure network designed to protect its users, devices, and data. Furthermore, you will learn about various security deployments, key security terminologies, and...