PC Support & Repair Chapter 10 Fundamental Security.

Slides:



Advertisements
Similar presentations
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Advertisements

1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
PC Support & Repair Chapter 9 Fundamental Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
I T Essentials I Chapter 9 JEOPARDY.
Chapter 9 Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Security IT Essentials 5.0.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch9. Fundamental Security.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 9 1 Chapter 9: Fundamental Security IT Essentials: PC Hardware and.
IT Essentials: PC Hardware and Software v4.0
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
I T Essentials I Chapter 4 JEOPARDY PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
PC Support & Repair Chapter 10 Security. Objectives After completing this chapter, you will meet these objectives: ▫ Explain why security is important.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Information Systems Design and Development Security Precautions Computing Science.
Network System Security - Task 2. Russell Johnston.
© 2015 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 12: Security IT Essentials v6.0.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Chapter 12: Security IT Essentials v6.0
Instructor Materials Chapter 7 Network Security
Chapter 9: Fundamental Security
Malware, Phishing and Network Policies
Securing Windows 7 Lesson 10.
Instructor Materials Chapter 12: Security
G061 - Network Security.
Presentation transcript:

PC Support & Repair Chapter 10 Fundamental Security

Objectives After completing this chapter, you will meet these objectives: ▫ Explain why security is important. ▫ Describe security threats. ▫ Identify security procedures. ▫ Identify common preventive maintenance techniques for security. ▫ Troubleshoot security.

Why is Security Important?

Describe Security Threats Define viruses, worms, and Trojans. Explain web security. Define adware, spyware, and grayware. Explain Denial of Service (DoS). Describe spam and popup windows. Explain social engineering. Explain TCP/IP attacks. Explain hardware deconstruction and recycling.

Virus Malicious intent Attached to software, documents, or code ▫ Some can lay dormant Executes when program runs/opens ▫ Can corrupt or delete files ▫ Some capture keystrokes Spreads by , file transfer, IM

Worm Self-replicating program Duplicates across network w/out you knowing ▫ Doesn’t need to attach to program Ties up bandwidth of network ▫ Can’t perform normal network functions

Trojan Horse Hidden in software ▫ “Appears” to be something good Can reproduce & spread ▫ Loss of data ▫ Infect other computers

Anti-Virus Software Can detect, disable, and remove viruses, worms, and Trojans YOU must be sure to apply updates (virus signature files” a programing code), patches, etc. Have a security policy at company Maintenance schedule Make employees aware of opening attachments Name some AV software

Adware Displays ads on computer ▫ Usually in pop ups ▫ Pops up faster than you can close Comes in software you download

Malware Grayware ▫ Not a virus but harmful or annoying  Phishing attacks  May change desktop background, home page ▫ Can be removed using spyware and adware removal tools ▫ Detection looks at patterns in the programming code of the software on a computer

Spyware Type of grayware ▫ Similar to adware ▫ Make your computer ▫ Display incorrect homepage Distributes w/out you knowing Monitors computer activity ▫ Sends info to creator

Phishing Social engineering Pretends to be legit ▫ Bank contact ▫ Ask to verify password or account to prevent something bad from happening ▫ Through link to real-looking web page

Activity

Review What places ads on the desktop without you doing anything? ▫ Adware Name two types of malware. ▫ Grayware & spyware What program is self-replicating? ▫ Worm How do you make sure your AV software can protect you from the latest viruses? ▫ Download the latest virus updates

Review Which attack comes by and directs you to a web page to enter personal info? ▫ Phishing Which software is installed on your computer w/out your knowing when you download a program and it displays product “windows” on the screen? ▫ Adware What ties up the networks bandwidth? ▫ Worm

Denial of Service (DoS) Prevents users from accessing services on network ▫ System is busy responding to the large amounts of requests; Resources get overloaded & shut down Disconnect the host from network PING OF DEATH ▫ Many, large pings BOMB ▫ Large amounts of bulk overloads server DDoS ▫ Uses infected “zombie” computers to launch attacks ▫ Zombies are all over the place; can’t trace attack

DoS

Spam Unsolicited junk mail Can include links to infected site ▫ Or pop-ups /AV software can detect it ▫ No subject line ▫ Incomplete return address ▫ Computer generated ▫ Return not sent by the user

Social Engineering Person who can gain access to equipment or network by tricking people ▫ Get their username/password Ensuring that each uses of an access card to only one user at a time Guide visitor within the premises escorting them as they leave

Other Attacks through TCP/IP Spoofing ▫ Gains access to resources on devices by pretending to be a trusted computer Man-in-the-middle ▫ Intercepts or inserts false information in traffic between two hosts ▫ Replay- TCIP attack were attackers uses sniffer to extract user names and passwords of critical account information

Hardware Destruction Data wiping ▫ Used to remove sensitive data  Formatting is not enough ▫ Overwrites data multiple times Hard drive destruction ▫ Shatter platters with hammer ▫ Shred CD’s & floppies Hard drive recycling (no sensitive data) ▫ Format & reuse or donate

Review A visitor at your work looks over your shoulder & sees your password. They then go home & use it to access the network. What is this called? ▫ Social engineering Which attack uses zombies all over to overwhelm/flood servers? ▫ DDoS The IRS is replacing their computers. What should you do to the old hard drives to protect any sensitive data before you recycle the PC’s? ▫ Destroy with a hammer

Review Which attack tricks you into entering your personal info through and a spoofed web site? ▫ Phishing What is the proper way to remove personal data from a hard drive that does not contain sensitive info? ▫ Data wiping What attack gets the info before it gets to its destination? ▫ Man-in-the-middle

Identify Security Procedures Explain what is required in a basic local security policy. Explain the tasks required to protect physical equipment. Describe ways to protect data. Describe wireless security techniques.

Protecting Equipment Physical ▫ Cable locks ▫ Locked rooms ▫ Security cages ▫ Alarms ▫ Web cams Access ▫ Card keys ▫ Biometrics –uses physical characteristics ▫ Disable the auto run feature on the operating system ▫ Security guards

Protecting Equipment Trusted Platform Module (TPM) Physical security technology ▫ Chip installed on motherboard ▫ Can authenticate hardware & software ▫ Store info about host  Digital certificates  Passwords  Encryption keys ▫ Makes it harder for hackers to gain access  Because it’s hardware based

Developing organizational security policies What assets need protection What needs to be done in case of security breach What are the possible threats to the item

Protect Data BIOS password ▫ Prevents BIOS changes & OS access Login password

Security Policy A security policy should describe how a company addresses security issues. Everyone in the organization should give high priority to computer and network security Everyone can be affected by computer and network security problems

Passwords Should expire after a specific period of time Should contain a mix of letters and numbers Lockout rules apply after unsuccessful attempts Rules should state: ▫ Username naming convention (jsmith) ▫ When passwords expire & when they will lockout Standards should prevent users from writing down passwords and exposing them to public view

Protect Data Data encryption ▫ Used in a VPN Firewall ▫ Allows/denies traffic to & from network Smart Card ▫ Card with chip Biometrics ▫ Fingerprint, eye, facial, etc.

Data Backups Full weekly or monthly ▫ Then frequent partial Should be stored off-site Protect backup with password

Wireless Security SSID ▫ Name of wireless network ▫ Can disable the broadcast MAC address filter ▫ Only your MAC addresses allowed Encrypt & authenticate data ▫ WEP (weak) ▫ WPA (better) WPA2 (best) ▫ LEAP (Cisco’s for Win & Linux)

Wireless Security Poor wireless device security This condition allow unauthorized access to a network who are not physically connected Uses WPA2 to secure traffic

Wireless Security Techniques

Review A fingerprint reader is what kind of security? ▫ Biometrics Which wireless security should you use when you have all Cisco equipment? ▫ LEAP Where should backups be stored? ▫ Off-site How should a telecommuter send secure data to the company while traveling? ▫ Through a VPN

Review To secure your wireless network you should disable this & enable this… ▫ Disable the SSID broadcast ▫ Enable WPA encryption T or F. Passwords should be text only. T or F. You should set a password lockout rule. What hardware/software security method on the motherboard supports storing encryption keys, digital certificates, and passwords? ▫ TPM

Review What was the 1 st wireless encryption, which is also the weakest? ▫ WEP This Cisco encryption is just as strong as WPA2. ▫ LEAP What security method has a chip on a card? ▫ Smart Card What wireless security method will ensure ONLY your computers are accessing the network? ▫ MAC address filtering

Lab Packet Tracer Lab ▫ Build & secure a wireless network

Preventive Maintenance for Security Explain how to update signature files for anti-virus and anti-spyware software. Explain how to install operating system service packs and security patches.

Java & Active X Can be used to install unwanted program on your computer

Step 1 Identify the problem (open ended questions) Step 2 Establish a theory of probable causes Step 3 Determine an exact cause Step 4 Implement a solution( establish a plan of action for resolution) Step 5 Verify solution and full system functionality Step 6 Document findings Troubleshooting Process

Installing Patches & Service Packs Usually to fix security holes ▫ Windows XP had a lot of them! 1.Create a restore point 2.Check for updates 3.Download 4.Install 5.Make sure it works

Common Communication Encryption Types Hash Encoding uses a mathematical function to create a numeric value that is unique to the data. Symmetric Encryption requires both sides of an encrypted conversation to use an encryption key to encode and decode the data. Asymmetric Encryption requires two keys, a private key and a public key.

Presentation_ID 45 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Port Forwarding and Port Triggering  Port forwarding is a rule-based method of directing traffic between devices on separate networks: Used when specific ports must be opened so that certain programs and applications can communicate with devices on different networks. Router determines if the traffic should be forwarded to a certain device based on the port number found with the traffic. For example HTTP – Port 80.  Port triggering allows the router to temporarily forward data through inbound ports to a specific device. For example, a video game might use ports to for connecting with other players. These are the trigger ports.

Presentation_ID 46 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Configuring Firewall Types  A Firewall selectively denies traffic to a computer or network segment. Based on Ports and Protocols  Restrictive security policy - A firewall that opens only the required ports. Any packet not explicitly permitted is denied.  Configuring the Windows 7 or Windows Vista firewall can be completed in two ways: Automatically - The user is prompted to Keep Blocking, Unblock, or Ask Me Later for unsolicited requests. Manage Security Settings – the user adds the program or ports that are required for the applications in use on the network.

Presentation_ID 47 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential A security policy should address these key areas:  Process for handling network security incidents  Process to audit existing network security  General security framework for implementing network security  Behaviors that are allowed  Behaviors that are prohibited  What to log and how to store the logs: Event Viewer, system log files, or security log files  Network access to resources through account permissions  ( ensure the security policy is enforced )Authentication technologies to access data: usernames, passwords, biometrics, and smart cards Security Policy Requirements

Presentation_ID 48 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Signature(Programing code patterns of viruses) File Updates  Uses Fixmbr command when a virus has damage master boot record  Set virus protection to scan removable media when data is acessed.

Troubleshooting

Review- 11 Questions

PC Support & Repair Chapter 9 Fundamental Security