ABSTRACT

Chapter 8 focused attention on security threats, examining viruses, directed broadcasts, and other techniques that can cause harm to both computers and networks. This chapter changes direction concerning the field of security and examines proactive techniques one can implement to protect networks and computers connected to networks.