© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
PC Support & Repair Chapter 9 Fundamental Security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Chapter Nine Maintaining a Computer Part III: Malware.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
PC Support & Repair Chapter 10 Fundamental Security.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
I T Essentials I Chapter 9 JEOPARDY.
Chapter 9 Computer Security.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 5 1 Control Panel Applets.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Security IT Essentials 5.0.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch9. Fundamental Security.
IT security By Tilly Gerlack.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 9 1 Chapter 9: Fundamental Security IT Essentials: PC Hardware and.
IT Essentials: PC Hardware and Software v4.0
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 16 1 Chapter 16: Advanced Security IT Essentials: PC Hardware and Software.
Chapter 4: Overview of Preventive Maintenance
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 4 1 Chapter 4: Basics of Preventive Maintenance and Troubleshooting IT.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Computer Maintenance and Troubleshooting
12015/10/20 Muhammad Salman University of Indonesia.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
I T Essentials I Chapter 4 JEOPARDY PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri
IT Essentials: PC Hardware and Software v4.0. Chapter 4 Objectives 4.1 Explain the purpose of preventive maintenance 4.2 Identify the steps of the troubleshooting.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 4 1 Chapter 4: Basics of Preventive Maintenance and Troubleshooting IT.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
PREVENTIVE COMPUTER MAINTENANCE. Preventive Maintenance regular and systematic inspection, cleaning, and replacement of worn parts, materials, and systems.
NetTech Solutions Protecting the Computer Lesson 10.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Computer Security Sample security policy Dr Alexei Vernitski.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Overview of Preventive Maintenance IT Essentials 5.0.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Instructor Materials Chapter 7 Network Security
Chapter 9: Fundamental Security
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0

ITE PC v4.0 Chapter 9 2 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Purpose of this Presentation  List of chapter objectives  Overview of the chapter contents, including student worksheets student activities some potential student misconceptions  Reflection/Activities for instructors to complete to prepare to teach  Additional resources To provide to instructors an overview of Chapter 9:

ITE PC v4.0 Chapter 9 3 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Chapter 9 Objectives  9.1 Explain why security is important  9.2 Describe security threats  9.3 Identify security procedures  9.4 Identify common preventive maintenance techniques for security  9.5 Troubleshoot security

ITE PC v4.0 Chapter 9 4 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Chapter 9 Worksheets and Activity  9.1 Worksheet: Security Attacks  Worksheet: Third-Party Anti-Virus Software  Activity: Adware, Spyware, and Grayware  Worksheet: Operating System Updates  Worksheet: Gather Information from the Customer

ITE PC v4.0 Chapter 9 5 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public The Importance of Security  Private information, company secrets, financial data, computer equipment, and items of national security are placed at risk if proper security procedures are not followed.  A technician’s primary responsibilities include data and network security.

ITE PC v4.0 Chapter 9 6 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Threats Types of attacks to computer security:  Physical Theft, damage, or destruction to computer equipment.  Data Removal, corruption, denial of access, unauthorized access, or theft of information. Potential threats to computer security:  Internal threats Employees can cause a malicious threat or an accidental threat.  External threats Outside users can attack in an unstructured or structured way.

ITE PC v4.0 Chapter 9 7 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Viruses, Worms, and Trojan Horses  A computer virus is software code that is deliberately created by an attacker. Viruses may collect sensitive information or may alter or destroy information.  A worm is a self-replicating program that uses the network to duplicate its code to the hosts on the network. At a minimum, worms consume bandwidth in a network.  A Trojan horse is technically a worm and is named for its method of getting past computer defenses by pretending to be something useful.  Anti-virus software is designed to detect, disable, and remove viruses, worms, and Trojan horses before they infect a computer.

ITE PC v4.0 Chapter 9 8 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Web Security Attackers may use any of these tools to install a program on a computer.  ActiveX Controls interactivity on web pages  Java Allows applets to run within a browser Example: a calculator or a counter  JavaScript Interacts with HTML source code to allow interactive web sites Example: a rotating banner or a popup window

ITE PC v4.0 Chapter 9 9 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Adware, Spyware, and Grayware  Typically installed without the user’s knowledge, these programs collect information stored on the computer, change the computer configuration, or open extra windows on the computer and all without the user’s consent.

ITE PC v4.0 Chapter 9 10 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Denial of Service (DoS)  Prevents users from accessing normal services  Sends enough requests to overload a resource or even stopping its operation  Ping of Death is a series of repeated, larger than normal pings intended to crash the receiving computer  Bomb is a large quantity of bulk that overwhelms the server preventing users from accessing  Distributed DoS is an attack launched from many computers, called zombies

ITE PC v4.0 Chapter 9 11 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Spam and Popup Windows Use anti-virus software, options in software, popup blockers, and common indications of spam to combat these.  Spam is unsolicited that can be used to send harmful links or deceptive content.  Popups are windows that automatically open and are designed to capture your attention and lead you to advertising sites.

ITE PC v4.0 Chapter 9 12 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Social Engineering  Never give out a password  Always ask for the ID of the unknown person  Restrict access of unexpected visitors  Escort all visitors through the facility

ITE PC v4.0 Chapter 9 13 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public TCP/IP Attacks TCP/IP is used to control all Internet communications.

ITE PC v4.0 Chapter 9 14 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Computer Disposal and Recycling  Erase all hard drives, then use a third-party tool to fully erase all data.  The only way to fully ensure that data cannot be recovered from a hard drive is to carefully shatter the platters with a hammer and safely dispose of the pieces.  To destroy software media (floppy disks and CDs), use a shredding machine designed for shredding these materials.

ITE PC v4.0 Chapter 9 15 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security is Strengthened in Layers

ITE PC v4.0 Chapter 9 16 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Policy Questions to answer in writing a local security policy:  What assets require protection?  What are the possible threats?  What should be done in the event of a security breach?

ITE PC v4.0 Chapter 9 17 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Protecting Equipment Since stealing the whole PC is the easiest way to steal data, physical computer equipment must be secured.  Control access to facilities  Use cable locks  Lock telecommunication rooms  Use security screws  Use security cages around equipment  Label and install sensors on equipment

ITE PC v4.0 Chapter 9 18 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Protecting Data Methods of securing data:  Password protection  Data encryption  Port protection  Data backups  File system security

ITE PC v4.0 Chapter 9 19 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Levels of Wireless Security

ITE PC v4.0 Chapter 9 20 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Installing Updates and Patches A technician recognizes when new updates and patches are available and knows how to install them.

ITE PC v4.0 Chapter 9 21 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Updating Protection Programs Launch protection program Run a scan Click update button Manually treat or delete Schedule future automatic updates and scans Need to manuall y treat or delete? Review scan report Create a restore point Yes No

ITE PC v4.0 Chapter 9 22 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Operating System Updates and Patches Check for updates Install update Download updates Restart computer Test all aspects to ensure the update has not caused issues Prompte d to restart? Create a restore point Yes No

ITE PC v4.0 Chapter 9 23 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Step 1 Gather data from the customer Step 2 Verify the obvious issues Step 3 Try quick solutions first Step 4 Gather data from the computer Step 5 Evaluate the problem and implement the solution Step 6 Close with the customer Troubleshooting Process

ITE PC v4.0 Chapter 9 24 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1. Gather Data from the Customer  Customer information Company name, contact name, address, phone number  Computer configuration Protection software, OS, network environment, connection type  Description of problem Open-ended questions What changes were made to the security settings? Closed-ended questions Are the protection software signature files up-to-date?

ITE PC v4.0 Chapter 9 25 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 2. Verify the Obvious Issues Examine the most obvious causes of a problem.  A visual inspection can resolve some issues. Broken locks, signs of tampering, missing equipment  Has an attacker accessed the equipment? Unfamiliar login address in login windows, unexplained entries in system security logs, missing or additional patch cords  Wireless network issues Changes in access point configuration, unexplained connections in the access point status display

ITE PC v4.0 Chapter 9 26 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 3. Try Quick Solutions First  Check that all cables are connected to the proper locations  Unseat and then reconnect cables and connectors  Reboot the computer or network device  Login as a different user  Check that the anti-virus and spyware signature files are up- to-date  Scan computer with protection software  Check computer for the latest OS patches and updates  Disconnect from the network  Change your password

ITE PC v4.0 Chapter 9 27 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 4. Gather Data from the Computer  Third-party software, such as anti-virus and anti- spyware applications, can report on the files that have been infected.  There are several tools available in the operating system that a technician can use: Verify that the signature file is current. Check the security software log file for entries. Task Manager is used to check for unknown applications that are running.

ITE PC v4.0 Chapter 9 28 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 5. Evaluate Problem & Implement Solution 1.Evaluate the information gathered from the customer and from the laptop 2.Determine possible solutions 3.Implement the best solution 4.If a proposed solution doesn’t correct the problem, reset the computer back to the original state and try another proposed solution. NOTE: Never ask a customer to reveal a password.

ITE PC v4.0 Chapter 9 29 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 6. Close with the Customer  Discuss with customer the solution implemented.  Have customer verify problem is solved.  Provide all paperwork to customer.  Document steps of solution in work order and in technician’s journal.  Document components used in repair.  Document time spent to resolve the problem.

ITE PC v4.0 Chapter 9 30 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Common Problems and Solutions Problem SymptomPossible Solution A computer runs updates and requires rebooting at inconvenient times. Set Windows Automatic Update to run daily at a convenient time, such as lunchtime. A wireless network is compromised even though 64-bit WEP encryption is in use. Upgrade to 128-bit WEP security, WAP, or EAP-Cisco security. A stolen laptop is returned by the police. It is no longer needed by the user. After recovering any sensitive data, destroy the hard drive and recycle the computer. A user complains that his system is receiving hundreds or thousands of junk s daily. This may be a denial of service attack. At the server, filter out from the sender. A printer repair person no one remembers seeing before is observed looking under keyboards and on desktops. Contact security or police. Advise users never to hide passwords near their work area.

ITE PC v4.0 Chapter 9 31 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Chapter 9 Summary Following proper security procedures will protect computers and network equipment, and the data they contain, from physical danger such as fire and theft, as well as from loss and damage by employees and attackers.  Security threats can come from inside or outside of an organization.  Viruses and worms are common threats that attack data.  Develop and maintain a security plan to protect both data and physical equipment from loss.  Keep operating systems and applications up to date and secure with patches and service packs.

ITE PC v4.0 Chapter 9 32 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Instructor Training Activities

ITE PC v4.0 Chapter 9 33 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Activities for Instructor Training 1.Take the Quiz provided in Chapter 9 course content. 2.Conduct Internet research to pre-screen online resources for students to use in completing the following student worksheets: 9.1 Worksheet: Security Attacks Worksheet: Third-Party Anti-Virus Software Worksheet: Operating System Updates 3.Brainstorm a list of at least 4 additional troubleshooting scenarios to provide students more opportunities to practice this skill. For an example, refer to the student worksheet, Gather Information from the Customer.

ITE PC v4.0 Chapter 9 34 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Instructor Training Discussion  Share with the other instructors the list of online resources found that students might use in completing the research activity worksheets.  Share with the other instructors the list of additional troubleshooting scenarios.  Participate in a role-playing activity of one of the troubleshooting scenarios.  Following the role-playing activity, discuss the different ways you might incorporate role-playing activities into your classroom. Share ideas of how to make the student successful in these activities.

ITE PC v4.0 Chapter 9 35 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Additional Resources  Whatis?com: IT Encyclopedia and Learning Center  TechTarget: The Most Targeted IT Media  ZDNet: Tech News, Blogs and White Papers for IT Professionals  HowStuffWorks: It's Good to Know  CNET.com  PC World  ComputerWorld  WIRED NEWS  eWEEK.com

ITE PC v4.0 Chapter 9 36 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Q and A

ITE PC v4.0 Chapter 9 37 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public