CCNA Discovery 1 Chp. 8: Basic Security. Contents. 8.1 : Networking Threats Risks of intrusion Sources of intrusion Social Engineering 8.2: Methods of Attack Viruses, Worms, Trojan Horses DOS, Brute Force Attacks Spyware, Trackers Spam 8.3 : Security Policies Security Measures
CCNA Discovery 1Chp. 8: Basic Security
When a security policy is developed, it is necessary that all users of the network support and follow the security policy in order for it to be effective.