For Dummies CompTIA A+ Certification All-In-One, 2nd Edition 978-0-470-48738-9 User Manual
Product codes
978-0-470-48738-9
Chapter 1: Fundamentals
of Security
of Security
Exam Objectives
✓
Types of attacks
✓
Physical security
✓
Authentication and authorization
✓
Data protection
O
ne of the most important skills to have if you are going to support net-
worked systems or systems connected to the Internet is the capability
worked systems or systems connected to the Internet is the capability
of securing systems and networks. And even if you are not working in a net-
worked environment, you can apply these same skills to your customers
with home Internet machines. The bottom line is that you need a solid
understanding of network security.
worked environment, you can apply these same skills to your customers
with home Internet machines. The bottom line is that you need a solid
understanding of network security.
I remember when a close friend of mine had his Web site totally replaced
by a hacker. My friend’s Web site files were replaced with inappropriate
content, and he wondered how on Earth someone had hacked his server. It
seems amazing now, but back then (circa 1994), a lot of companies did not
use firewalls because they were not aware of the risks involved in having a
computer connected directly to the Internet. Back then, people thought, “I
have a password on the administrator account, so I am secure.”
by a hacker. My friend’s Web site files were replaced with inappropriate
content, and he wondered how on Earth someone had hacked his server. It
seems amazing now, but back then (circa 1994), a lot of companies did not
use firewalls because they were not aware of the risks involved in having a
computer connected directly to the Internet. Back then, people thought, “I
have a password on the administrator account, so I am secure.”
In this chapter, I introduce you to the basic concepts and terminology
used to help secure an environment. Be sure to read this chapter carefully
and make sure you understand the topics as you will be tested on security
topics on the A+ exams. Have fun with this topic area — it is very exciting!
used to help secure an environment. Be sure to read this chapter carefully
and make sure you understand the topics as you will be tested on security
topics on the A+ exams. Have fun with this topic area — it is very exciting!
Identifying Types of Attacks
To me, a hacker is someone with the technical expertise to bypass the secu-
rity of a network or an OS. A hacker knows how to use features of a piece
of software or hardware to gain access to restricted areas of a network and
then how to use those features against you and your system. For example,
most Web sites connect to a database behind the scenes so that you can
get a list of products when you visit their site. A hacker knows how to input
rity of a network or an OS. A hacker knows how to use features of a piece
of software or hardware to gain access to restricted areas of a network and
then how to use those features against you and your system. For example,
most Web sites connect to a database behind the scenes so that you can
get a list of products when you visit their site. A hacker knows how to input
49_487389-bk09ch01.indd 1039
49_487389-bk09ch01.indd 1039
9/10/09 11:03 PM
9/10/09 11:03 PM
COPYRIGHTED MATERIAL