discovery home sb chapter 8

Upload: visky

Post on 31-May-2018

212 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 Discovery Home SB Chapter 8

    1/21

    2007 Cisco Systems, Inc. All rights reserved. Cisco PublicITE PC v4.0Chapter 1 1

    Basic Security

    Networking for Home and Small Businesses Chapter8

  • 8/14/2019 Discovery Home SB Chapter 8

    2/21

    ITE PC v4.0Chapter 1 2 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Objectives Identify and describe the various networking threats.

    Identify different methods of attack.

    Describe security procedures and applications.

    Describe the features of a firewall and how it can beused to protect against an attack.

  • 8/14/2019 Discovery Home SB Chapter 8

    3/21

    ITE PC v4.0Chapter 1 3 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Networking Threats Describe major risks of network intrusion

  • 8/14/2019 Discovery Home SB Chapter 8

    4/21

    ITE PC v4.0Chapter 1 4 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Networking Threats Define the sources of network intrusion.

  • 8/14/2019 Discovery Home SB Chapter 8

    5/21

    ITE PC v4.0Chapter 1 5 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Networking Threats Describe social engineering and phishing

  • 8/14/2019 Discovery Home SB Chapter 8

    6/21

    ITE PC v4.0Chapter 1 6 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Methods of Attack Describe viruses, worms, and Trojan horses.

  • 8/14/2019 Discovery Home SB Chapter 8

    7/21ITE PC v4.0Chapter 1 7 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Methods of Attack Denial of Service and Brute Force attacks

  • 8/14/2019 Discovery Home SB Chapter 8

    8/21ITE PC v4.0Chapter 1 8 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Methods of Attack Describe spyware, tracking cookies, adware and pop-

    ups.

  • 8/14/2019 Discovery Home SB Chapter 8

    9/21ITE PC v4.0Chapter 1 9 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Methods of Attack Describe Spam

  • 8/14/2019 Discovery Home SB Chapter 8

    10/21ITE PC v4.0Chapter 1 10 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Security Procedures and Applications Defining a security policy

  • 8/14/2019 Discovery Home SB Chapter 8

    11/21ITE PC v4.0Chapter 1 11 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Security Procedures and Applications Define common security procedures

  • 8/14/2019 Discovery Home SB Chapter 8

    12/21ITE PC v4.0Chapter 1 12 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Security Procedures and Applications

    Describe how updates and patches relate to securityissues.

  • 8/14/2019 Discovery Home SB Chapter 8

    13/21

    ITE PC v4.0Chapter 1 13 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Security Procedures and Applications

    Anti-virus software

  • 8/14/2019 Discovery Home SB Chapter 8

    14/21

    ITE PC v4.0Chapter 1 14 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Security Procedures and Applications

    SPAMprevention

  • 8/14/2019 Discovery Home SB Chapter 8

    15/21

    ITE PC v4.0Chapter 1 15 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Security Procedures and Applications

    Anti-Spyware

  • 8/14/2019 Discovery Home SB Chapter 8

    16/21

    ITE PC v4.0Chapter 1 16 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Firewall Features and How to Use them toProtect Against an Attack

    What is a firewall?

  • 8/14/2019 Discovery Home SB Chapter 8

    17/21

    ITE PC v4.0Chapter 1 17 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Firewall Features and How to Use them toProtect Against an Attack

    Using a Firewall to Protect Against an Attack

  • 8/14/2019 Discovery Home SB Chapter 8

    18/21

    ITE PC v4.0Chapter 1 18 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Firewall Features and How to Use them toProtect Against an Attack

    Vulnerability Analysis

  • 8/14/2019 Discovery Home SB Chapter 8

    19/21

    ITE PC v4.0Chapter 1 19 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Firewall Features and How to Use them toProtect Against an Attack

    Security Best Practices

  • 8/14/2019 Discovery Home SB Chapter 8

    20/21

    ITE PC v4.0Chapter 1 20 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Summary Networks can be open to intrusion through

    vulnerabilities in software, hardware attacks, or theweaknesses of individuals.

    Effective network security is based on a variety of

    products and services, combined with a thoroughsecurity policy.

    A firewall controls traffic between networks and helpsprevent unauthorized access.

  • 8/14/2019 Discovery Home SB Chapter 8

    21/21

    ITE PC v4 0