Читать книгу Networking All-in-One For Dummies - Lowe Doug, Doug Lowe - Страница 64
Cybersecurity
ОглавлениеIN THIS CHAPTER
Assessing the risk for security
Looking at two pillars of cybersecurity
Identifying the most important protection and recovery measures
Examining standardized cybersecurity frameworks
Looking closer at the NIST Cybersecurity Framework
As an IT professional, cybersecurity is the thing most likely to keep you awake at night. Consider the following scenarios:
Your phone starts ringing like crazy at 3 o’clock one afternoon because no one anywhere on the network can access any of their files. You soon discover that your network has been infiltrated by ransomware, nefarious software that has encrypted every byte of data on your network, rendering it useless to your users until you pay a ransom to recover the data.
Your company becomes a headline on CNN because a security breach has resulted in the theft of your customers’ credit card information.
On his last day of work, a disgruntled employee copies your company contact list and other vital intellectual property to a flash drive and walks away with it along with his red Swingline stapler. A few months later, your company loses its biggest contract to the company where this jerk now works.
There is no way you can absolutely prevent such scenarios from ever happening, but with proper security, you can greatly reduce their likelihood. This chapter presents a brief overview of some of the basic principles of securing your network.
Cybersecurity goes hand in hand with networking. In fact, the moment you think of building a network, you should lay the groundwork for how you’ll keep it secure. You should consider the security aspects of a network from the very start and throughout the design and implementation of your network. Security will touch every aspect of your network environment — not just network equipment such as firewalls and switches, but also servers, end-user computers, user accounts, data storage, and so on.