In this seminar the class will discuss the network administrator’s perspective. It provides a framework of solutions, guidelines, outlines and best practices. It supplies concise topic coverage for constructing a baseline of security processes. It is a single source reference that gives you a place to turn when you need help focusing on the important security tasks instead of the day-to-day problems that take up all your time. In Unit 8 I Chapter 15 in the CompTIA Security + Study Guide eBook. In Chapter 15 I read the key elements of implementing, supporting, and maintaining security efforts in an organization. To do this, IT professionals must understand how to simplify security administration, understand the key role education plays in security, and …show more content…
Understanding the role of the security administrator in ensuring the adoption of basic security practices. Managing strategic polices, departmental policies, technology issues, and personnel issues are all a part of security management.
A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. (This includes the hacker, cracker, and script kiddy.) Generally, a honeypot consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers. This is similar to the police baiting a criminal and then conducting undercover surveillance. The first issue for security topics I have chosen is the email security. As it states in the book, emails are one of the biggest security