【正文】
er work and workaccessible resources. 2. Network security concepts Network security starts from authenticating the user, monly with a username and a password. Since this requires just one thing besides the user name, . the password which is something you 39。, this is sometimes termed one factor authentication. With two factor authentication something you 39。 is also used (. a security token or 39。, an ATM card, or your mobile phone), or with three factor authentication something you 39。 is also used (. a fingerprint or retinal scan). Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the work users. Though effective to prevent unauthorized access, this ponent may fail to check potentially harmful content such as puter worms or Trojans being transmitted over the work. Antivirus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware. An anomalybased intrusion detection system may also monitor the work and traffic for unexpected (. suspicious) content or behavior and other anomalies to protect resources, . from denial of service attacks or an employee accessing files at strange times. Individual events occurring on the work may be logged for audit purposes and for later high level analysis. 3. Security management Security Management for works is different