While hackers with motives make
headlines, they represent less than 20% of all net- work security breaches. More
common are instances of authorized users accidentally winding up where they
should not be and inadvertently deleting or changing data. However, the Internet
introduces another concern: some Internet surfers are bound to go where they
have no business and, in so doing, threaten to wipe out data to which they
should not have access. Before picking a firewall, companies need to adopt security policies. A security policy states who or what is allowed to connect to whom or what. You can group all users by department or classification. The better firewall products let you drag and drop groups in a graphical user interface (GUI) environment to define network security easily. Two methods are most often used together to esta A. Hackers and Our Defense B. Internet Surfers’ Guide C. Firewall: A Measure of Network Security D. Information Technology 更多"Passage 2 While hackers w"的相关试题: [单项选择]Passage 2
|