Personal Firewalls for Administrators and Remote Users

    Date13 Mar 2003
    2790
    Posted ByAnthony Pell
    The book starts with a chapter dedicated to security basics. The author introduces general security principles and helps you realize why firewalls exist. Yeo naturally notes that a firewall is not the only method of defense you should use. Here you'll . . . The book starts with a chapter dedicated to security basics. The author introduces general security principles and helps you realize why firewalls exist. Yeo naturally notes that a firewall is not the only method of defense you should use. Here you'll learn about the three basic principles of information security: confidentiality, integrity and availability. They are all explained with examples that even users without any knowledge of computer security can understand. Following is a part dedicated to risk assessment where you'll see the various types of risks that you can be affected by. Once you've made the risk assessment you can create a security policy and Yeo illustrates the things to consider when creating one. The last part is dedicated to the explanation of what firewalls do, why they are necessary and you'll see why you might need a firewall.
    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"8","type":"x","order":"1","pct":88.89,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.