© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and Software.

Slides:



Advertisements
Similar presentations
Support for Windows 7 Chapter 2 Securing and Troubleshooting Windows 7.
Advertisements

CIT In this chapter you will learn how to:  Explain the threats to your computers and data  Describe key security concepts and technologies.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Malware Response Infrastructure Planning and Design Published: February 2011 Updated: November 2011.
ITE PC v4.0 Chapter 1 1 Operating Systems Computer Networks– 2.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Security Awareness: Applying Practical Security in Your World
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
Network security policy: best practices
Welcome to Networking! 1. Connect your computer to the network with a cable 2. Copy the Networking folder from the flash drive to the computer or your.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and Software.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Characterizing the Existing Network Designing and Supporting Computer Networks.
1 ISP Help Desk Working at a Small-to-Medium Business or ISP – Chapter 2.
Operating Systems Networking for Home and Small Businesses – Chapter 2 – Introduction To Networking.
Hands-On Microsoft Windows Server 2008
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 5 1 Control Panel Applets.
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 4 1 Chapter 4: Basics of Preventive Maintenance and Troubleshooting IT.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
Module 14: Configuring Server Security Compliance
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 IT Essentials PC Hardware and Software v4.0 Pete Lawrence June 2007.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Operating Systems Networking for Home and Small Businesses – Chapter.
I T Essentials I Chapter 4 JEOPARDY PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri
IT Essentials: PC Hardware and Software v4.0. Chapter 4 Objectives 4.1 Explain the purpose of preventive maintenance 4.2 Identify the steps of the troubleshooting.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 4 1 Chapter 4: Basics of Preventive Maintenance and Troubleshooting IT.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 2 Securing Network Server and User Workstations.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
PREVENTIVE COMPUTER MAINTENANCE. Preventive Maintenance regular and systematic inspection, cleaning, and replacement of worn parts, materials, and systems.
NetTech Solutions Security and Security Permissions Lesson Nine.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
NetTech Solutions Protecting the Computer Lesson 10.
NETWORKING & SYSTEM UPDATES
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Overview of Preventive Maintenance IT Essentials 5.0.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Help Desk Working at a Small-to-Medium Business or ISP – Chapter.
Introducing, Installing, and Upgrading Windows 7
Instructor Materials Chapter 6 Building a Home Network
Instructor Materials Chapter 9: Testing and Troubleshooting
Chapter 16: Advanced Security
Networking for Home and Small Businesses – Chapter 2
Networking for Home and Small Businesses – Chapter 2
Bethesda Cybersecurity Club
Instructor Materials Chapter 8: Applied Networking
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and Software v4.0

ITE PC v4.0 Chapter 16 2 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Purpose of this Presentation  List of chapter objectives  Overview of the chapter contents, including student worksheets student labs student activities  Reflection/Activities for instructors to complete to prepare to teach  Additional resources To provide to instructors an overview of Chapter 16:

ITE PC v4.0 Chapter 16 3 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Chapter 16 Objectives  16.1 Outline security requirements based on customer needs  16.2 Select security components based on customer needs  16.3 Implement customer's security policy  16.4 Perform preventive maintenance on security  16.5 Troubleshoot security

ITE PC v4.0 Chapter 16 4 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Chapter 16 Worksheets, Activities, Labs  Worksheet: Security Policy  Activity: Security Devices  Worksheet: Firewalls  Lab: Windows XP Firewall  Lab: Fix a Security Problem  Remote Technician: Fix a Security Problem

ITE PC v4.0 Chapter 16 5 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Is the computer located at a home or a business?  Is there full-time Internet access?  Is the computer a laptop? Outline Security Requirements A security policy includes a comprehensive statement about the level of security required and how this security will be achieved.

ITE PC v4.0 Chapter 16 6 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Outline a Security Policy  Define an acceptable computer usage statement.  Identify the people permitted to use the computer equipment.  Identify devices that are permitted to be installed on a network, as well as the conditions of the installation.  Define the requirements necessary for data to remain confidential on a network.  Determine a process for employees to acquire access to equipment and data. A collection of rules, guidelines, and checklists:

ITE PC v4.0 Chapter 16 7 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Hardware  To restrict access to premises, you might use biometrics, fences, and/or door locks.  To protect the network infrastructure, you might secure telecom rooms, setup detection for unauthorized use of wireless, and/or setup hardware firewalls.  To protect individual computers, you might use cable locks, laptop docking station locks and/or lockable cases.  To protect data, you might use lockable HD carriers and/or USP security dongles. Identify hardware and equipment that can be used to prevent theft, vandalism, and data loss.

ITE PC v4.0 Chapter 16 8 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Applications  Software Firewall  Intrusion Detection Systems (IDS)  Application and OS Patches  Anti-virus software and anti-malware software Security applications protect the operating system and software application data. Compare the cost of data loss to the expense of security protection, and then determine what tradeoffs are acceptable.

ITE PC v4.0 Chapter 16 9 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Selecting Security Components Consider the following factors when deciding on security components:  Advantages and disadvantages of a security component  Overlapping features and functions  Component setup and maintenance requirements  Budget restrictions  Real and perceived threats

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Techniques  Use encrypted passwords to login to the network  Monitor network activity through logging and auditing  Set up data encryption over wireless Encryption methods include:  Hash encoding uses an algorithm to track tampering  Symmetric encryption uses a key to encode/decode data  Asymmetric encryption uses one key to encode and another key to decode  VPN creates a virtual “secure tunnel” Depending on the situation, more than one technique may be required.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Access Control Devices Physical access control devices Two-factor identification methods for access control  Lock  Conduit  Card key  Video surveillance  Guards  Smart card  Security key fob  Biometric device

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Firewall Types Hardware Firewall Free-standing and uses dedicated hardware Initial cost for hardware and software updates can be costly Multiple computers can be protected Little impact on the computer performance Available as 3 rd party software and cost varies Included in Windows XP operating system Typically protects only the computer it is installed on Uses the CPU, potentially slowing the computer Software Firewall

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Configure Security Settings Two primary security settings include: Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) MAC address filtering Unused wireless connections Service Set Identifier (SSID) Broadcasting Wireless antenna  Setting levels of permissions on folders and files Use FAT or NTFS to configure folder sharing or folder-level permissions for users with network access Use file-level permissions with NTFS to configure access to files  Securing wireless access points

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Configure Firewalls  A restrictive firewall policy (open only the required ports)  A permissive firewall policy (open all ports except those explicitly denied)  Configure a software firewall manually or to run automatically.  Configure a hardware firewall by indicating what is filtered by port type, port number, source address, and/or destination address.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Protect Against Malware  Anti-virus, anti-spyware, anti-adware, and phishing programs Phishing attacks trick the user into providing the personal information. A user’s data can be sold and/or used fraudulently. Run software scanning programs to detect and remove the malicious software.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Operating System Updates Windows XP update options:  Automatic: Automatically downloads and installs without user intervention.  Only Download Updates: Download the updates automatically, but the user is required to install them.  Notify Me: Notify the user that updates are available and gives the user the option to download and install.  Turn off Automatic Updates: Prevents automatically checking for updates. Updates have to be discovered, downloaded and installed by the user.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public User Account Maintenance  Group employees by job requirements to give access to files by setting up group permissions.  When an employee leaves an organization, access to the network should be terminated immediately.  Guests can be given access through a Guest account.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Data Backups Description Full or Normal Backup Archives all selected files Incremental Backup Archives all selected files that have changed since last full or incremental backup. It marks files as having been backed up. Differential Backup Archives everything that has changed since last full backup. It does not mark files as having been backed up. Daily Backup Archives all selected files that have changed on the day of the backup Copy BackupArchives all selected files

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Step 1 Gather data from the customer Step 2 Verify the obvious issues Step 3 Try quick solutions first Step 4 Gather data from the computer Step 5 Evaluate the problem and implement the solution Step 6 Close with the customer Troubleshooting Process

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Level-one Technician Gathers Data Description of problem by the level-one helpdesk technician:  Customer is unable to connect to the network using wireless connection. Customer cannot surf the Internet. Customer cannot access any resources on the network. Wireless does not seem to be working properly at the office. The customer has checked all settings.  The helpdesk technician was unable to resolve the problem, so the work order is escalated to a level-two technician.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Open-Ended Questions Here are some open-ended questions that a level-two technician might ask to gather more information from the customer in this scenario:  Which specific network resources are you trying to access with your wireless system?  Are there any network resources that you can access by wireless?  When were you last able to access the network using wireless at the office?  How does your computer perform using wireless at other locations?

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Level-two Technician Draws Conclusions Based on the information given by the customer to the open-ended questions, these conclusions can be determined:  In the office, no resources can be accessed.  When operating away from the office, no problems are experienced.  The problems started just after a new wireless router was installed.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Closed-Ended Questions Here are some closed-ended questions that a level-two technician might ask to gather more information from the customer in this scenario:  Is your network cable plugged in?  When you plug in your network cable, does everything work correctly? From the answers to these questions, you determine that the customer is experiencing a wireless connection problem. Therefore, focus your efforts on a problem with wireless connectivity in the office.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Verify the Obvious Issues Examine the most obvious causes of a problem.  Does the access point appear to be on?  What lights on the access point are on or flashing?  Does anyone else have this problem?  Have you been able to connect to the Internet since the wireless router was upgraded?  Does this problem occur only at your desk or at other areas of the office as well?  Have you been able to connect through wireless at any other locations?

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Conclusions from Checking the Obvious  The network login and password are valid.  The wireless card in the user's computer operates normally.  The problem is not interference with the wireless signal.  There is probably a wireless configuration issue.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Quick Solutions  Check the wireless signal strength in various areas in the office.  Try connecting using wireless connection with security settings turned off. Results of quick solutions:  The wireless signal strength seems normal.  Wireless connection works with security turned off. So the problem is probably a configuration issue.  Check the configurations on the computer and on the access point.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Gather Data from the Computer Determine the MAC address of the computer: 1.Select Start > Run 2.Type cmd in the Run box. The Command Line interface should appear 3.Enter ipconfig /all at the command prompt. 4.Write down the MAC address of the wireless NIC and of the Ethernet NIC. No resolution to the problem has been found at this point. The problem is most likely to be found in the configuration of the wireless access point security settings.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Evaluate Problem & Implement Solution 1. What do you know now?  Works using the Ethernet cable  Works using wireless at home  Works using wireless when the security is disabled  No one else has the problem  Doesn’t work when connected to the office wireless access point  Might be incorrect wireless access point configuration settings  The MAC address filter on the access point was incorrectly configured for this customer.  Add the computer’s MAC address to the wireless access point MAC address filter list. 2. Determine possible solutions 3. Implement the best solution

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Close with the Customer  Discuss with customer the solution implemented.  Have customer verify problem is solved.  Provide all paperwork to customer.  Document steps of solution.  Document components used in repair.  Document time spent to resolve the problem.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Common Problems and Solutions Problem SymptomPossible Solution A customer reports that a backup that was started the night before is still going. Advise the customer to implement a different type of backup that saves time. A visiting consultant using a guest account cannot access needed files. Grant access to the files for the duration of the visit. When the consultant leaves, disable the account. A user refuses your request to you their student ID number and password. Inform the user that there was no such request. Gather information and warn others against this phishing attack. A user can locate a file on the server but cannot download it. Change the user permissions on this file from read to read and execute. A user cannot connect to the network using a wireless router even after the proper security key has been installed. Verify that the user’s MAC address is listed in the MAC address filter table.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Fix a Security Problem Now that you understand the troubleshooting process, it is time to apply your listening and diagnostic skills.  Receive the work order  Research the problem  Take the customer through various steps to try and resolve the problem  Document the problem and the resolution

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Chapter 16 Summary Advanced Security  Security requirements for customers differ because of budget restraints, the type of equipment to secure, and the decision regarding hardware and software security.  A security policy should be developed and used to determine the type of firewall to be installed.  Hardware and software security tools are available to protect data on a network.  Security policies should be followed by everyone in the organization.  Preventive maintenance is an effective part of security.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Instructor Training Activities

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Activities for Instructor Training 1.Take the Quiz provided in Chapter 16 course content. 2.Collect examples from the recent news of people loosing government laptops or copying sensitive data in an un-encrypted form. Use these examples as discussion points in Outline a local security policy. 3.Conduct Internet research to pre-screen online resources for students to use in completing the worksheet, Firewalls. 4.Brainstorm a list of at least 4 security problems to use for students to practice their troubleshooting skills.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Instructor Training Discussion  Share with the other instructors the list of online resources found that students might use in completing the research portions of the worksheet.  Share with the other instructors the list of additional troubleshooting scenarios.  Participate in a role-playing activity of one of the troubleshooting scenarios.  Following the role-playing activity, discuss the different ways you might incorporate role-playing activities into your classroom. Share ideas of how to make the student successful in these activities.

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Additional Resources  Linksys: Learning Center  Home PC Firewall Guide TM  HowStuffWorks: It's Good to Know  United States Computer Emergence Readiness Team: Cyber Security Tip  Microsoft: Security at Home: Firewall FAQs  ConsumerSearch: Firewalls Reviews, Best Firewalls  Matousec: Comparison of Top Five Personal Firewalls five-comparison.php five-comparison.php  Computer Shopper, PC PRO UK: Personal Firewalls firewalls/introduction.html firewalls/introduction.html  Information Week: Safety First: 5 Firewalls for Your Desktop PC

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Q and A

ITE PC v4.0 Chapter © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public