In previous articles in this series, we looked at how data are formatted, MAC addressing, and the use of IP addresses. In this article, we examine switched networks and identify their advantages over hub-centric and peer-to-peer configurations.
In this final installment of the Information Security Primer series, we’ll examine some fundamentals of risk management, specifically the components of a sound security program. The proper application of risk management principles provides the framework upon which managers base the reasonable and appropriate application of security controls.
This is the first in a series exploring the basic principles of information and network defense. This article reviews the history of networks and the emergence of security. This series, and other upcoming articles about security and risk management in small and medium size businesses, contain updated content from the book “Just Enough Security: Information security for business managers.”