CHAPTER 17 NETWORK MANAGEMENT 17-1 OBJECTIVES Describe how symmetric and asymmetric key-based encryption system work Digital signatures and certificates Describe various types of network accesss control Discuss disaster recovery planning Describe the security of home network www.gxmu.edu.cnDescribe how symmetric and asymmetric key-based encryption system work; Digital signatures and certificates; Describe various types of network accesss control ; Discuss disaster recovery planning; Describe the security of home network; www.gxmu.edu.cn CHAPTER 17 NETWORK MANAGEMENT 17-1 OBJECTIVES