Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CompTIA Network+ N10-008 Certification Guide - Second Edition

You're reading from   CompTIA Network+ N10-008 Certification Guide - Second Edition The ultimate guide to passing the N10-008 exam

Arrow left icon
Product type Paperback
Published in Nov 2022
Publisher Packt
ISBN-13 9781803236063
Length 692 pages
Edition 2nd Edition
Arrow right icon
Author (1):
Arrow left icon
Glen D. Singh Glen D. Singh
Author Profile Icon Glen D. Singh
Glen D. Singh
Arrow right icon
View More author details
Toc

Table of Contents (26) Chapters Close

Preface 1. Part 1: Networking Concepts
2. Chapter 1: Exploring the OSI Model and TCP/IP FREE CHAPTER 3. Chapter 2: Network Topologies and Connections 4. Chapter 3: Ethernet Technology and Virtualization 5. Chapter 4: Understanding IPv4 and IPv6 Addressing 6. Chapter 5: Applied IPv4 Subnetting 7. Chapter 6: Exploring Network Protocols and Services 8. Chapter 7: Data Center Architecture and Cloud Computing 9. Part 2: Network Implementation
10. Chapter 8: Networking Devices 11. Chapter 9: Routing and Switching Concepts 12. Chapter 10: Exploring Wireless Standards and Technologies 13. Part 3: Network Operations
14. Chapter 11: Assuring Network Availability 15. Chapter 12: Organizational Documents and Policies 16. Chapter 13: High Availability and Disaster Recovery 17. Part 4: Network Security and Troubleshooting
18. Chapter 14: Network Security Concepts 19. Chapter 15: Exploring Cyberattacks and Threats 20. Chapter 16: Implementing Network Security 21. Chapter 17: Network Troubleshooting 22. Chapter 18: Practice Exam 23. Assessments 24. Index 25. Other Books You May Enjoy

Risk management

Each day, people make decisions to mitigate and prevent various types of risks in their daily lives, workplaces, and organizations. In this context of network security, risk is defined as the likelihood/possibility that a threat actor can cause harm or damage to a system. IT professionals must be able to identify the assets that could be attacked and compromised by cyber-attacks and threats. As you may recall, assets are simply anything that has value to an organization and are usually tangible, intangible, and people (employees). By identifying the assets, security professionals will get a better idea of what needs to be safeguarded from potential threats.

Furthermore, IT professionals need to identify the various types of threats and threat actors and how they can potentially compromise the assets of the organization. A hacker will commonly perform reconnaissance to collect a lot of information about their target before launching an attack. The information that...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image