Download presentation
Presentation is loading. Please wait.
Published byPiers Wright Modified over 8 years ago
1
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8
2
ITE PC v4.0 Chapter 1 2 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Objectives Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications. Describe the features of a firewall and how it can be used to protect against an attack.
3
ITE PC v4.0 Chapter 1 3 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Networking Threats Major risks of network intrusion
4
ITE PC v4.0 Chapter 1 4 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Networking Threats Sources of network intrusion
5
ITE PC v4.0 Chapter 1 5 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Networking Threats Social engineering and phishing
6
ITE PC v4.0 Chapter 1 6 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Networking Threats Social engineering and phishing
7
ITE PC v4.0 Chapter 1 7 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Methods of Attack Viruses, worms, and Trojan horses A virus is a program that runs and spreads by modifying other programs or files. A virus cannot start by itself; it needs to be activated. A virus can delete or corrupt files. Viruses can be transmitted via email attachments, downloaded files, instant messages or via diskette, CD or USB devices. A worm is similar to a virus, but unlike a virus does not need to attach itself to an existing program. A worm uses the network to send copies of itself to any connected hosts. They do not need activation or human intervention. A Trojan horse is a non-self replicating program that appears like a legitimate program. It deceives the victim into initiating the program. It can damage the contents of the computer's hard drive. Trojans can also create a back door into a system allowing hackers to get in the computer.
8
ITE PC v4.0 Chapter 1 8 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Methods of Attack Denial of Service and Brute Force attacks
9
ITE PC v4.0 Chapter 1 9 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Methods of Attack Spyware, tracking cookies, adware and pop-ups Spyware is a program that gathers personal information from your computer without your permission or knowledge. Cookies are a form of spyware but are not always bad. They record information about an Internet user when they visit websites. Cookies can be useful allowing personalization of websites. Many web sites require that cookies be enabled.
10
ITE PC v4.0 Chapter 1 10 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Methods of Attack Spam
11
ITE PC v4.0 Chapter 1 11 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Procedures and Applications Security policy
12
ITE PC v4.0 Chapter 1 12 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Procedures and Applications Common security procedures
13
ITE PC v4.0 Chapter 1 13 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Procedures and Applications Updates and patches
14
ITE PC v4.0 Chapter 1 14 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Procedures and Applications Anti-virus software
15
ITE PC v4.0 Chapter 1 15 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Procedures and Applications SPAM prevention
16
ITE PC v4.0 Chapter 1 16 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Procedures and Applications Anti-Spyware
17
ITE PC v4.0 Chapter 1 17 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Firewall Features and How to Use them to Protect Against an Attack Firewall
18
ITE PC v4.0 Chapter 1 18 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Firewall Features Using a Firewall
19
ITE PC v4.0 Chapter 1 19 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Firewall Features Vulnerability Analysis
20
ITE PC v4.0 Chapter 1 20 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public How to Protect Against an Attack Security Best Practices
21
ITE PC v4.0 Chapter 1 21 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Summary Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals. Effective network security is based on a variety of products and services, combined with a thorough security policy. A firewall controls traffic between networks and helps prevent unauthorized access.
22
ITE PC v4.0 Chapter 1 22 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.