IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.

Slides:



Advertisements
Similar presentations
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Advertisements

Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
PC Support & Repair Chapter 9 Fundamental Security.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA
Network Threats and Mitigation Networking Essentials Chapter 14 Spring, 2013.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Norman SecureSurf Protect your users when surfing the Internet.
Chapter Nine Maintaining a Computer Part III: Malware.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
PC Support & Repair Chapter 10 Fundamental Security.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Information Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
I T Essentials I Chapter 9 JEOPARDY.
Chapter 9 Computer Security.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Hacker Zombie Computer Reflectors Target.
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
BUSINESS B1 Information Security.
Internet Security facilities for secure communication.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Security IT Essentials 5.0.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch9. Fundamental Security.
IT security By Tilly Gerlack.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 9 1 Chapter 9: Fundamental Security IT Essentials: PC Hardware and.
IT Essentials: PC Hardware and Software v4.0
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
I T Essentials I Chapter 4 JEOPARDY PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri
PC Support & Repair Chapter 10 Security. Objectives After completing this chapter, you will meet these objectives: ▫ Explain why security is important.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer Hope Copyright © Cannady ACOS. All rights reserved. (R1: July 2011)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Security Threats Caela Harris. What is a Virus A computer virus or a computer worm is a malicious software program that can self replicate on computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Information Systems Design and Development Security Precautions Computing Science.
Computer Security Keeping you and your computer safe in the digital world.
© 2015 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 12: Security IT Essentials v6.0.
Instructor Materials Chapter 7 Network Security
How to Get Rid of Online Threats Impacting your Computer Device?
Teaching Computing to GCSE
Chapter 9: Fundamental Security
Implementing Client Security on Windows 2000 and Windows XP Level 150
Networking for Home and Small Businesses – Chapter 8
Instructor Materials Chapter 12: Security
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

IT Essentials 1 Chapter 9 JEOPADY

RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands Viruses Security Threats TCP/IP Attacks Security Security Procedures Preventative Maintenance Trouble- shooting ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄

Question A program written with malicious intent. Viruses 100 A: What is a virus?

Question A: What is a worm? A self-replicating program that is harmful to networks Viruses

Question A: What is a Trojan? Often disguised as useful software. Viruses 300

Question A: What is Consume Bandwidth? Worms are harmful in a network because they_____________. Viruses 400

Question A: What is a Stealth Virus. Type of virus that lays dormant until summoned by the attacker Viruses 500

Question A: What is Adware? Displays advertising on the user’s computer. Security Threats

Question A: What is Spyware? Monitors activity on the computer. Security Threats 200

Question A: What is Phishing? Attacker pretends to represent a legitimate outside organization. Security Threats 300

Question A: What is a Social Engineer? A person that is able to gain access to private information through tricks. Security Threats 400

Question A: What is ActiveX, Java, or JavaScript Two of the three web tools that attackers use to install a program on a computer Security Threats 500

Question A: What is zombies? These infected computers make tracing the origin of the DoS attack difficult to locate. TCP/IP Attacks 100

Question A: What is usernames and passwords? Information extracted from a replay attack. TCP/IP Attacks 200

Question A: What is spoofing? A form of attack to gain access to resources on devices by pretending to be a trusted computer TCP/IP Attacks 300

Question A: What is SYN flood? A specific type of DoS attack via random TCP/IP ports TCP/IP Attacks 400

Question A: What is DNS Poisoning? A technique to redirect to false servers containing malicious content TCP/IP Attacks 500

Question A: What is NTFS? A file system with increased security and compatibility. Security Procedures 100

Question A: What is a Security Policy? A list of definitions to describe how a company addresses security issues. Security Procedures 200

Question A: What is BIOS and Login? Two levels of password protection. Security Procedures 300

Question A: What is Cable Locks, RFID tags, Berg Connectors, Biometric Sensors, Security Guards and Security Cages? List two methods of physical security. Security Procedures 400

Question A: What is a WPA2? An encryption format covering the entire i standard. Security Procedures 500

Question A: What is a signature? Patterns in the programming code of the software in a computer – used by antivirus programs to identify threats. Preventative Maintenance 100

Question A: What is a patch? Code update provided by manufacturers of operating systems and software applications. Preventative Maintenance 200

Question A: What is a Service Pack? A comprehensive update application which combines patches and upgrades. Preventative Maintenance 300

Question A: What is 3 AM? Default time for Windows Update to install updates and patches. Preventative Maintenance 400

Question A: What is Create a Restore Point? The first step when installing service packs and security patches. Preventative Maintenance 500

Question A: What is slow computer operation OR slow Internet connection? A common sign that a computer may have a virus Troubleshooting 100

Question A: What is That the problem has been solved? In Closing with the customer, you should have them verify _____________. Troubleshooting 200

Question A: What is Other Techs, Internet Search, News Groups, Manufacturer FAQs, Manuals, Online Forums, Technical Websites Two resources that could be used to Evaluate the Problem. Troubleshooting 300

Question A: What is 128-bit WEP, WAP, or EAP-Cisco ? One type of security that is better than 64-bit WEP. Troubleshooting 400

Question A: What is Scan the Computer, Reboot, Login as different user, Check for OS updates/patches, update anti-virus signatures, change password? Two Quick Solutions for virus problems Troubleshooting 500

Question A: What is a Biometric sensor? Identifies physical characteristics of the user, such as fingerprints or retinas Final Jeopardy