Discovery Home S B Chapter 8

21
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8

Transcript of Discovery Home S B Chapter 8

Page 1: Discovery  Home  S B  Chapter  8

© 2007 Cisco Systems, Inc. All rights reserved. Cisco PublicITE PC v4.0Chapter 1 1

Basic Security

Networking for Home and Small Businesses – Chapter 8

Page 2: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Objectives Identify and describe the various networking threats.

Identify different methods of attack.

Describe security procedures and applications.

Describe the features of a firewall and how it can be used to protect against an attack.

Page 3: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Networking Threats Describe major risks of network intrusion

Page 4: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Networking Threats Define the sources of network intrusion.

Page 5: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Networking Threats Describe social engineering and phishing

Page 6: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Methods of Attack Describe viruses, worms, and Trojan horses.

Page 7: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Methods of Attack Denial of Service and Brute Force attacks

Page 8: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Methods of Attack Describe spyware, tracking cookies, adware and pop-

ups.

Page 9: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Methods of Attack Describe Spam

Page 10: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Procedures and Applications Defining a security policy

Page 11: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Procedures and Applications Define common security procedures

Page 12: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Procedures and Applications Describe how updates and patches relate to security

issues.

Page 13: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Procedures and Applications Anti-virus software

Page 14: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Procedures and Applications SPAM prevention

Page 15: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security Procedures and Applications Anti-Spyware

Page 16: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Firewall Features and How to Use them to Protect Against an Attack What is a firewall?

Page 17: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Firewall Features and How to Use them to Protect Against an Attack Using a Firewall to Protect Against an Attack

Page 18: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Firewall Features and How to Use them to Protect Against an Attack Vulnerability Analysis

Page 19: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Firewall Features and How to Use them to Protect Against an Attack Security Best Practices

Page 20: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Summary Networks can be open to intrusion through

vulnerabilities in software, hardware attacks, or the weaknesses of individuals.

Effective network security is based on a variety of products and services, combined with a thorough security policy.

A firewall controls traffic between networks and helps prevent unauthorized access.

Page 21: Discovery  Home  S B  Chapter  8

ITE PC v4.0Chapter 1 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public