CHAPTER 17 NETWORK MANAGEMENT PART THREE INTRODUCTION CHAPTER 17 Examines the vital topic of network security and explains many ways in which networks can be made more secure CHAPTER 18 You will cover encryption digital signatures, and digital certificates in detail, and you will understand the importance of user IDs and strong passwords CHAPTER 19 You will investigate the threat of viruses and other network perils as well as steps that can be taken to minimize their Impact www.gxmu.edu.cn
PART THREE INTRODUCTION www.gxmu.edu.cn CHAPTER 17 Examines the vital topic of network security and explains many ways in which networks can be made more secure. CHAPTER 18 You will cover encryption, digital signatures, and digital certificates in detail, and you will understand the importance of user IDs and strong passwords. CHAPTER 19 You will investigate the threat of viruses and other network perils as well as steps that can be taken to minimize their impact. CHAPTER 17 NETWORK MANAGEMENT
CHAPTER 17 NETWORK MANAGEMENT Chapter 18 Explains network design and implementation process Learn that designing a new or changed network is a multiphase activity That requires user involvement along the way Study the various steds in the process, sted that are described and illustrated www.gxmu.edu.cn
www.gxmu.edu.cn Explains network design and implementation process. Learn that designing a new or changed network is a multiphase activity That requires user involvement along the way . Study the various steds in the process, sted that are described and illustrated. Chapter 18 CHAPTER 17 NETWORK MANAGEMENT
A CHAPTER 17 NETWORK MANAGEMENT Chapter 19 Describes network management and operations process Explore the reasons for managing a network and the standard management functions that are put into a network context Learn the practical issues of day-to-day operation of a network problem management, performance management configuration management, change management www.gxmu.edu.cn
Chapter 19 www.gxmu.edu.cn Describes network management and operations process. Explore the reasons for managing a network and the standard management functions that are put into a network context. Learn the practical issues of day-to-day operation of a network: problem management, performance management , configuration management, change management CHAPTER 17 NETWORK MANAGEMENT
9 CHAPTER 17 NETWORK MANAGEMENT Chapter 17 Network Security 17-IIntroduction 17-2 Why is needs 17-3 Management's responsibili 17-4 types of threat Security architecture Security attacks Security services www.gxmu.edu.cn
Chapter 17 Network Security 17-1 Introduction 17-2 Why is needs 17-3 Management's responsibility 17-4 types of threat • Security Architecture • Security attacks • Security services www.gxmu.edu.cn CHAPTER 17 NETWORK MANAGEMENT
CHAPTER 17 NETWORK MANAGEMENT 17-1 OBJECTIVES Explain why it is necessary Discuss management's responsibility Describe key elements of a network security policy; ist the types of security threats Explain purpose, pros, and cons of encryption www.gxmu.edu.cn
17-1 OBJECTIVES Explain why it is necessary; Discuss management's responsibility; Describe key elements of a network security policy; List the types of security threats; Explain purpose, pros, and cons of encryption; www.gxmu.edu.cn CHAPTER 17 NETWORK MANAGEMENT