Summary
In this chapter, you learned about the CIA triad and how network professionals can use it to improve data security within their organizations. Additionally, you learned about various types of security risks and threats that can cause harm to systems and networks in many companies. Furthermore, you discovered various types of authentication methods and how they can be used to reduce account takeovers while preventing unauthorized access to systems.
I hope this chapter has been informative for you and is helpful in your journey toward learning networking and becoming a network professional. In the next chapter, Chapter 15, Exploring Cyberattacks and Threats, you will learn about various types of attacks and threats, as well as how to identify them.