© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.

Slides:



Advertisements
Similar presentations
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Advertisements

Support for Windows 7 Chapter 2 Securing and Troubleshooting Windows 7.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
PC Support & Repair Chapter 9 Fundamental Security.
Lesson 19: Configuring Windows Firewall
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Complete CompTIA A+ Guide to PCs, 6e
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Securing a Wireless Network
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
PC Support & Repair Chapter 10 Fundamental Security.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and Software.
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features.
Hands-On Microsoft Windows Server 2008
I T Essentials I Chapter 9 JEOPARDY.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 5 1 Control Panel Applets.
Module 4: Add Client Computers and Devices to the Network.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and.
Week #7 Objectives: Secure Windows 7 Desktop
Chapter Fourteen Windows XP Professional Fault Tolerance.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 4 1 Chapter 4: Basics of Preventive Maintenance and Troubleshooting IT.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
Troubleshooting Windows Vista Security Chapter 4.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Operating Systems Networking for Home and Small Businesses – Chapter.
© 2014 Pearson IT Certification Computer and Network Security.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
I T Essentials I Chapter 4 JEOPARDY PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri
Module 15 Managing Windows Server® 2008 Backup and Restore.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 4 1 Chapter 4: Basics of Preventive Maintenance and Troubleshooting IT.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
NetTech Solutions Protecting the Computer Lesson 10.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Privilege Management Chapter 22.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Overview of Preventive Maintenance IT Essentials 5.0.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
Working at a Small-to-Medium Business or ISP – Chapter 8
Business Risks of Insecure Networks
Security of a Local Area Network
Chapter 16: Advanced Security
IT Essentials PC Hardware and Software 4
IT Essentials PC Hardware and Software 4
IT Essentials PC Hardware and Software 4
Instructor Materials Chapter 8: Applied Networking
Presentation transcript:

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 16: Advanced Security

Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Objectives  Outline security requirements based on customer needs.  Select security components based on customer needs.  Implement the customer's security plan.  Perform preventive maintenance on security.  Troubleshoot security.

Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Critical Concepts  What is this chapter about and why is it important?  A school once asked an advisory committee whether they should have a mandatory security course in their program. The response was not only that a mandatory course should be included, but that every computer course should contain a security section, and every computer course topic should include the topic of security.  Computer security cannot be touched upon lightly. It is a moral and ethical obligation of any computer technician to ensure that a computer is configured for security and that the user is informed of security best practices. This chapter describes security policies, the security requirements and components that match customer needs, preventive measures that increase security, and ways to configure and troubleshoot security-related issues.

Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Activities  What activities are associated with this chapter? Worksheet: Answer Security Policy Questions Worksheet: Research Firewalls Lab: Configure Wireless Security Lab: Configure Windows XP Firewall Optional Lab: Configure Windows Vista Firewall Lab: Data Backup and Recovery in Windows XP Optional Lab: Data Backup and Recovery in Windows Vista Lab: Fix a Security Problem Lab: Remote Technician: Fix a Security Problem Lab: Troubleshooting Access Security with Windows XP Optional Lab: Troubleshooting Access Security with Windows Vista Chapter 16 Quiz

Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: New Terms  What terms are introduced in this chapter? asymmetric encryption event firewall16.1 hardware firewall local security policy proxy security key fob smart card software firewall Symmetric encryption16.2.1

Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: New Terms  What terms are introduced in this chapter? Virus Scan16.5.2

Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page Outline a local security policy Security policy elements Page Explain when and how to use security hardware End user instruction Page Explain when and how to use security application software End user instruction Intrusion detection systems

Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page Configure security settings Wireless WEP WPA MAC filtering Routers/access points MAC filtering Changing default username and password Firewalls

Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page Configure security settings (continued) Basics of hardware and software firewall configuration Port assignment/setting up rules Port forwarding/port triggering Operating systems Local users and groups Vista User Account Control NTFS permissions vs. share permission Allow vs. deny Differentiate between moving and copying files and folders File attributes File and folder sharing

Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page Describe configuring firewall types Basics of hardware and software firewall configuration Port assignment Setting up rules Page Explain data backup procedures, access to backups, and secure physical backup media Ntbackup utility

Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page Review the troubleshooting process Identify the Problem Establish a Theory of Probable Causes Determine an Exact Cause Implement a Solution Verify Solution and Full System Functionality Document Findings

Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page Identify common problems and solutions Using antivirus software Identification of malware symptoms Quarantine of infected systems Researching malware types, symptoms, and solutions Remediation of infected systems Updating antivirus software and instruct the end user Signature engine updates Automatic vs. manual updates Configuring proxy settings Ports IP addresses Exceptions Programs

Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page Identify common problems and solutions (continued) Configuring firewall settings Open and closed ports Program filters Scheduling scans Repairing boot blocks Scan and removal techniques Safe mode Boot environment End user instruction

Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page Identify common problems and solutions (continued) Configuring operating system Vista User Account Control Shared files and folders Administrative shares vs. local shares Permission propagation Inheritance Data Encryption User authentication Securing the system BIOS security Drive lock Passwords TPM

Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Classroom Management  Have some students configure wireless NICs and others configure the access point. Reverse roles with different security settings. If time is an issue, bring an access point into the class that is already configured for three different SSIDs. Each SSID has a different security configuration. Students can configure a wireless NIC for each of the SSIDs and show connectivity.  Discuss physical security; it is a commonly forgotten topic. It can also be discussed when the security policy is explained.  Allow practice time for the class to role-play how they would educate a user on specific security-related issues such as viruses, malware, and phishing.

Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Teaching Analogies  Having a wireless or wired network without security is like leaving your front door unlocked and hoping that no intruder will enter the house. There are software applications that are like a thief who tries your door handle every day. If you do not have good security, eventually the thief will gain access to your computer or home.

Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential  What are the different methods of encryption? How and when should these encryption methods be used?  What are the different methods of authentication? How and when should these authentication methods be used?  What are the various file and folder permissions and how should they be used?  What is Windows Defender and why is it used?  What is port scanning and why is it used?  What is war driving and how can you defend against it?  What are some different types of security policies? Why is it important to have and follow a security policy? Chapter 16: Suggested Class Discussions

Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Best Practices  An employee that has been released from a company has a laptop protected with a fingerprint scanner. Research different vendor methods for recovering access to this laptop that is protected by a fingerprint scanner.  Have the students research different Windows security policies.  Give the students the following scenarios and have them create the appropriate security policy: Users in a small company get a lot of attachments. Create a policy that allows only certain file types to be contained in an attachment folder. Set up a software policy that will only affect those users that share a computer, such as part-time staff.

Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Outside Reading  National Security Agency  Verisign

Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential

Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential