Networking for Home and Small Businesses – Chapter 8 Basic Security Networking for Home and Small Businesses – Chapter 8
Objectives Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications. Describe the features of a firewall and how it can be used to protect against an attack.
Networking Threats Describe major risks of network intrusion
Networking Threats Define the sources of network intrusion.
Networking Threats Describe social engineering and phishing
Methods of Attack Describe viruses, worms, and Trojan horses.
Methods of Attack Denial of Service and Brute Force attacks
Methods of Attack Describe spyware, tracking cookies, adware and pop-ups.
Methods of Attack Describe Spam
Security Procedures and Applications Defining a security policy
Security Procedures and Applications Define common security procedures
Security Procedures and Applications Describe how updates and patches relate to security issues.
Security Procedures and Applications Anti-virus software
Security Procedures and Applications SPAM prevention
Security Procedures and Applications Anti-Spyware
Firewall Features and How to Use them to Protect Against an Attack What is a firewall?
Firewall Features and How to Use them to Protect Against an Attack Using a Firewall to Protect Against an Attack
Firewall Features and How to Use them to Protect Against an Attack Vulnerability Analysis
Firewall Features and How to Use them to Protect Against an Attack Security Best Practices
Summary Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals. Effective network security is based on a variety of products and services, combined with a thorough security policy. A firewall controls traffic between networks and helps prevent unauthorized access.