In the previous chapter you learned about the basic concept of infrastructure security and built a strong foundation for the different areas required to understand the need for information security based on current security threats that exist in cyber space.
The internet has grown dramatically and has reached a stage where everyone must be connected in order to exchange information. Imagine that billions of people with internet enabled devices are directly connected to the internet, and some sort of unsecured network becomes a target for cyber criminals.
In this chapter, we describe how to secure a network and look at the significance of network security. In a layered fashion, we will also discuss methods and approaches to building a secure network based on business aims.
The following topics will be covered in this chapter:
- Access control
- Network management...