PC Support & Repair Chapter 10 Security. Objectives After completing this chapter, you will meet these objectives: ▫ Explain why security is important.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
PC Support & Repair Chapter 9 Fundamental Security.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
PC Support & Repair Chapter 10 Fundamental Security.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
I T Essentials I Chapter 9 JEOPARDY.
Chapter 9 Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Security IT Essentials 5.0.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch9. Fundamental Security.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 9 1 Chapter 9: Fundamental Security IT Essentials: PC Hardware and.
IT Essentials: PC Hardware and Software v4.0
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
Troubleshooting Windows Vista Security Chapter 4.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Protecting Students on the School Computer Network Enfield High School.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
© 2014 Pearson IT Certification Computer and Network Security.
I T Essentials I Chapter 4 JEOPARDY PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Internet Security and Your Computer Welcome to Boot Camp.
 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
© 2015 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 12: Security IT Essentials v6.0.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
PC Support & Repair Chapter 12 Security
Instructor Materials Chapter 12: Security
Managing Windows Security
Instructor Materials Chapter 7 Network Security
Protect Your Computer Against Harmful Attacks!
Malware, Phishing and Network Policies
Implementing Client Security on Windows 2000 and Windows XP Level 150
PC Support & Repair Chapter 12 Security
Instructor Materials Chapter 12: Security
Presentation transcript:

PC Support & Repair Chapter 10 Security

Objectives After completing this chapter, you will meet these objectives: ▫ Explain why security is important. ▫ Describe security threats. ▫ Identify security procedures. ▫ Identify common preventive maintenance techniques for security. ▫ Troubleshoot security.

Why is Security Important?

Describe Security Threats Define adware, spyware, and phishing. Define viruses, worms, Trojans, and Rootkits. Explain web security. Explain Denial of Service (DoS). Describe spam and popup windows. Explain social engineering. Explain TCP/IP attacks. Explain hardware deconstruction and recycling.

Malware Software to create malicious acts ▫ Adware, spyware, grayware, viruses, worms, Trojan horses, rootkits Usually installed without user knowledge Open extra windows, changes computer’s config, redirect browser, collect info, etc.

Adware Displays ads on computer ▫ Usually in pop ups ▫ Pops up faster than you can close Comes in software you download

Spyware Similar to adware Distributed w/out you knowing Monitors computer activity ▫ Sends info to creator

Grayware Similar to adware May be malicious Sometimes installed WITH your consent ▫ Downloading software that installs a toolbar that displays ads or tracks your web history

Phishing Pretends to be legit ▫ Bank , phone, or text contact ▫ Ask to verify password or account to prevent something bad from happening ▫ Through link to real-looking web page

Try This…

Virus Malicious intent Spreads by , file transfer, IM Attached to software, documents, or code ▫ Some can lay dormant Executes when program runs/opens ▫ Can corrupt or delete files ▫ Some capture keystrokes

Worm Self-replicating program Duplicates across network w/out you knowing ▫ Doesn’t need to attach to program Ties up bandwidth of network ▫ Can’t perform normal network functions

Trojan Horse Hidden in software ▫ “Appears” to be something good Can reproduce & spread ▫ Loss of data ▫ Infect other computers Virus, Torjan, Worm

Anti-Virus Software Can detect, disable, and remove viruses, worms, and Trojans YOU must be sure to apply updates (virus signature files), patches, etc. Have a security policy at company Maintenance schedule Make employees aware of opening attachments Name some AV software

Rootkits Malicious program Gains full access to computer Uses known vulnerability or password to get admin access Is able to hide the files, registry edits, and folders that it uses from detection by typical virus or spyware programs ▫ Very difficult to detect because it has the rights to control and modify security programs May have to reinstall OS to get rid of it

Review- 4Q What places ads on the desktop without you doing anything? ▫ Adware Name two types of malware. ▫ Adware, spyware, grayware, virus, worm, Trojan, rootkit What program is self-replicating? ▫ Worm How do you make sure your AV software can protect you from the latest viruses? ▫ Download the latest virus updates

Review- 3Q Which attack comes by and directs you to a web page to enter personal info? ▫ Phishing Which software is installed on your computer w/out your knowing when you download a program and it displays product “windows” on the screen? ▫ Adware What ties up the networks bandwidth? ▫ Worm

Web Security Certain useful web tools can be exploited ▫ ActiveX ▫ Java ▫ JavaScript ▫ Adobe Flash ▫ Microsoft Silverlight Browsers set to “ask” you to authorize when you encounter these

Web Security Pop-up blocker SmartScreen Filter ▫ Detects phishing sites, analyzes sites for suspicious items, checks sites & downloads a list of sites and files that are known to be malicious ▫ In IE, on by default

InPrivate Browsing Prevents the browser from storing : ▫ Usernames ▫ Passwords ▫ Cookies ▫ Browsing history ▫ Temporary Internet files ▫ Form data

Spam Unsolicited junk mail Can include harmful links, malicious programs, or other bad content /AV software can detect it ▫ No subject line ▫ Incomplete return address ▫ Computer generated ▫ Return not sent by the user

Denial of Service (DoS) Prevents users from accessing services on network ▫ System is busy responding to the large amounts of requests; Resources get overloaded & shut down PING OF DEATH ▫ Many, large pings BOMB ▫ Large amounts of bulk overloads server DDoS ▫ Uses infected “zombie” computers to launch attacks ▫ Zombies are all over the place; can’t trace attack DoS/ DDoS

DoS

Other Attacks through TCP/IP Spoofing ▫ Gains access to resources on devices by pretending to be a trusted computer ▫ Uses forged IP/MAC Man-in-the-middle ▫ Intercepts or inserts false information in traffic between two hosts

Other Attacks through TCP/IP SYN Flood ▫ A SYN request initializes TCP communication ▫ This ties up the server by it replying to nothing

Social Engineering Person who can gain access to equipment or network by tricking people ▫ Get their username/password Pretend technician, Look over shoulders, Look through desks,

Hardware Destruction Data wiping ▫ Used to remove sensitive data  Formatting is not enough ▫ Overwrites data multiple times Hard drive destruction ▫ Shatter platters with hammer ▫ Shred CD’s & floppies Hard drive recycling (no sensitive data) ▫ Format & reuse or donate

Review- 3Q A visitor at your work looks over your shoulder & sees your password. They then go home & use it to access the network. What is this called? ▫ Social engineering Which attack uses zombies all over to overwhelm/flood servers? ▫ DDoS The IRS is replacing their computers. What should you do to the old hard drives to protect any sensitive data before you recycle the PC’s? ▫ Destroy with a hammer

Review- 3Q Which attack tricks you into entering your personal info through and a spoofed web site? ▫ Phishing What is the proper way to remove personal data from a hard drive that does not contain sensitive info? ▫ Data wiping What attack gets the info before it gets to its destination? ▫ Man-in-the-middle

Security Policy Includes: ▫ An acceptable computer usage statement for the organization. ▫ The people permitted to use the computer equipment. ▫ Devices that are permitted to be installed on a network, as well as the conditions of the installation. Modems and wireless access points are examples of hardware that could expose the network to attacks. ▫ Requirements necessary for data to remain confidential on a network. ▫ Process for employees to acquire access to equipment and data. This process may require the employee to sign an agreement regarding company rules. It also lists the consequences for failure to comply. Should describe how to address security issues

Project Do as a class

Username & Password Change defaults Use a naming convention for users ▫ EX: jsmith Don’t use other users login info

3 Levels of Passwords to Protect Data BIOS password ▫ Prevents BIOS changes & OS access Login password Network password

Password Requirements Should contain a mix of upper/lower case letters, numbers, and symbols Should expire/change after a specific period of time Lockout rules apply after unsuccessful attempts Rules should state: ▫ Username naming convention (jsmith) ▫ When passwords expire & when they will lockout Standards should prevent users from writing down passwords and exposing them to public view

Protect Data Firewall ▫ Allows/denies traffic to & from network Smart Card ▫ Plastic card with chip ▫ Stores information Biometrics ▫ Fingerprint, eye, facial, etc. Key fob

Data Backups Full weekly or monthly ▫ Then frequent partial Should be stored off-site Protect backup with password

Data Encryption- EFS EFS (Encrypting File System) in Windows ▫ Can encrypt files or folders ▫ Can only be opened by the user who encrypted them or by an administrator ▫ Right-click on file/folder, Properties, Advanced, Encrypt

Data Encryption- BitLocker in Windows Used to encrypt entire hard drive ▫ 1 st - initialize TPM in BIOS ▫ 2 nd - turn on BitLocker in CP Security Windows 7 uses BitLocker on Ultimate & Enterprise ▫ Needs a TPM (Trusted Platform Module) on the motherboard to store the encrypted keys OR a flash drive to store the keys BitLocker is 128-bit encryption Windows 7 BitLocker can be used for flash drives too ▫ Right-click on the drive and enable BitLocker

Review- Q

Protection Virus protection ▫ An antivirus program runs automatically in background & monitors for problems ▫ When virus is detected, user is warned & program attempts to quarantine or delete virus Spyware protection ▫ Antispyware programs scan for keyloggers, which capture your keystrokes, and other malware so that it can be removed Adware protection ▫ Anti-adware looks for programs that display ads on computer Phishing protection ▫ Antiphishing programs block the IP addresses of known phishing websites and warn you about suspicious websites

The Rogue Antivirus The AD that says you have a virus Looks like a Windows warning DON’T CLICK ANYTHING! ▫ Close tab/browser/Alt+F4

Removing a Virus Identify what’s happening Disconnect from the network Boot to Safe Mode & scan (or install AV) ▫ May need Safe Mode with Networking ▫ Use other tools Delete system restore files after cleaned Customer in a hurry? ▫ Remove HD & connect to external dock ▫ Copy data they need to another PC

Signature File Updates Get your updates for your AV software Auto update

Review- Q

Wireless Security SSID (Service Set Identifier) ▫ Name of wireless network ▫ Change & disable the broadcast MAC address filter ▫ Only listed MAC addresses allowed/prevented Encrypt & authenticate data ▫ WEP (weak) ▫ WPA (better) ▫ WPA2 (best)  Use TKIP or AES

Project PT Lab ▫ Configure WPA2 in the Linksys WRT300N ▫ Configure MAC Filtering in the Linksys WRT300N ▫ Configure Single Port Forwarding in the Linksys WRT300N Wireless Lab ▫ Configure WAP ▫ Set up MAC Filtering

Review A fingerprint reader is what kind of security? ▫ Biometrics Which wireless security should you use when you have all Cisco equipment? ▫ LEAP Where should backups be stored? ▫ Off-site How should a telecommuter send secure data to the company while traveling? ▫ Through a VPN

Review To secure your wireless network you should disable this & enable this… ▫ Disable the SSID broadcast ▫ Enable WPA encryption T or F. Passwords should be text only. T or F. You should set a password lockout rule. What hardware/software security method on the motherboard supports storing encryption keys, digital certificates, and passwords? ▫ TPM

Review What was the 1 st wireless encryption, which is also the weakest? ▫ WEP This Cisco encryption is just as strong as WPA2. ▫ LEAP What security method has a chip on a card? ▫ Smart Card What wireless security method will ensure ONLY your computers are accessing the network? ▫ MAC address filtering

Protecting Equipment Physical ▫ Cable locks ▫ Locked rooms ▫ Security cages ▫ Alarms ▫ Web cams Access ▫ Card keys ▫ Biometrics ▫ Security guards

Activity

Installing Patches & Service Packs Usually to fix security holes ▫ Windows XP had a lot of them! 1.Create a restore point 2.Check for updates 3.Download 4.Install 5.Make sure it works

Data Backups Use Windows Backups, manual or scheduled Backup & Restore in CP

Troubleshooting Complete Handout

Summary Security threats can come from inside or outside of an organization. Viruses and worms are common threats that attack data. Develop and maintain a security plan to protect both data and physical equipment from loss. Keep operating systems and applications up to date and secure with patches and service packs.

Review- 11 Questions

PC Support & Repair Chapter 10 Security