-
Book Overview & Buying
-
Table Of Contents
CEH v10 Certified Ethical Hacker Study Guide
By :
THE FOLLOWING CEH TOPICS ARE COVERED IN THIS CHAPTER:
Network security
Firewalls
Vulnerability scanners
Security policies
Security policy implications
Organizations generally spend a lot of time and money on defenses and mitigations against attacks. There are some fundamental concepts that go into the planning and implementation of these defenses. In this chapter, we’re going to cover some of the subject matter that helps security professionals make decisions about how best to protect enterprises. Some of this is foundational, but it’s necessary in order to build on it. By the end of the chapter, you’ll have the basics behind you and we’ll have started to talk about hard, defensive mechanisms. You will run across many of these if you are acting as an ethical hacker.
First, you need to understand what is meant by information security—what events fall into the security...
Change the font size
Change margin width
Change background colour