Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.

Similar presentations


Presentation on theme: "© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter."— Presentation transcript:

1 © 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 16: Advanced Security

2 Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Objectives  Outline security requirements based on customer needs.  Select security components based on customer needs.  Implement the customer's security plan.  Perform preventive maintenance on security.  Troubleshoot security.

3 Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Critical Concepts  What is this chapter about and why is it important?  A school once asked an advisory committee whether they should have a mandatory security course in their program. The response was not only that a mandatory course should be included, but that every computer course should contain a security section, and every computer course topic should include the topic of security.  Computer security cannot be touched upon lightly. It is a moral and ethical obligation of any computer technician to ensure that a computer is configured for security and that the user is informed of security best practices. This chapter describes security policies, the security requirements and components that match customer needs, preventive measures that increase security, and ways to configure and troubleshoot security-related issues.

4 Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Activities  What activities are associated with this chapter? 16.1.1 Worksheet: Answer Security Policy Questions 16.2.3 Worksheet: Research Firewalls 16.3.1 Lab: Configure Wireless Security 16.3.2 Lab: Configure Windows XP Firewall 16.3.2 Optional Lab: Configure Windows Vista Firewall 16.4.3 Lab: Data Backup and Recovery in Windows XP 16.4.3 Optional Lab: Data Backup and Recovery in Windows Vista 16.5.3 Lab: Fix a Security Problem 16.5.3 Lab: Remote Technician: Fix a Security Problem 16.5.3 Lab: Troubleshooting Access Security with Windows XP 16.5.3 Optional Lab: Troubleshooting Access Security with Windows Vista Chapter 16 Quiz

5 Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: New Terms  What terms are introduced in this chapter? asymmetric encryption16.2.1 event16.2.1 firewall16.1 hardware firewall16.2.3 local security policy16.1.1 proxy16.3.1 security key fob16.2.2 smart card16.2.2 software firewall16.1.3 Symmetric encryption16.2.1

6 Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: New Terms  What terms are introduced in this chapter? Virus Scan16.5.2

7 Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 16.1.1 Outline a local security policy Security policy elements Page 16.1.2 Explain when and how to use security hardware End user instruction Page 16.1.3 Explain when and how to use security application software End user instruction Intrusion detection systems

8 Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 16.3.1 Configure security settings Wireless WEP WPA MAC filtering Routers/access points MAC filtering Changing default username and password Firewalls

9 Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 16.3.1 Configure security settings (continued) Basics of hardware and software firewall configuration Port assignment/setting up rules Port forwarding/port triggering Operating systems Local users and groups Vista User Account Control NTFS permissions vs. share permission Allow vs. deny Differentiate between moving and copying files and folders File attributes File and folder sharing

10 Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 16.3.2 Describe configuring firewall types Basics of hardware and software firewall configuration Port assignment Setting up rules Page 16.4.3 Explain data backup procedures, access to backups, and secure physical backup media Ntbackup utility

11 Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 16.5.1 Review the troubleshooting process Identify the Problem Establish a Theory of Probable Causes Determine an Exact Cause Implement a Solution Verify Solution and Full System Functionality Document Findings

12 Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 16.5.2 Identify common problems and solutions Using antivirus software Identification of malware symptoms Quarantine of infected systems Researching malware types, symptoms, and solutions Remediation of infected systems Updating antivirus software and instruct the end user Signature engine updates Automatic vs. manual updates Configuring proxy settings Ports IP addresses Exceptions Programs

13 Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 16.5.2 Identify common problems and solutions (continued) Configuring firewall settings Open and closed ports Program filters Scheduling scans Repairing boot blocks Scan and removal techniques Safe mode Boot environment End user instruction

14 Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 16.5.2 Identify common problems and solutions (continued) Configuring operating system Vista User Account Control Shared files and folders Administrative shares vs. local shares Permission propagation Inheritance Data Encryption User authentication Securing the system BIOS security Drive lock Passwords TPM

15 Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Classroom Management  Have some students configure wireless NICs and others configure the access point. Reverse roles with different security settings. If time is an issue, bring an access point into the class that is already configured for three different SSIDs. Each SSID has a different security configuration. Students can configure a wireless NIC for each of the SSIDs and show connectivity.  Discuss physical security; it is a commonly forgotten topic. It can also be discussed when the security policy is explained.  Allow practice time for the class to role-play how they would educate a user on specific security-related issues such as viruses, malware, and phishing.

16 Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Teaching Analogies  Having a wireless or wired network without security is like leaving your front door unlocked and hoping that no intruder will enter the house. There are software applications that are like a thief who tries your door handle every day. If you do not have good security, eventually the thief will gain access to your computer or home.

17 Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential  What are the different methods of encryption? How and when should these encryption methods be used?  What are the different methods of authentication? How and when should these authentication methods be used?  What are the various file and folder permissions and how should they be used?  What is Windows Defender and why is it used?  What is port scanning and why is it used?  What is war driving and how can you defend against it?  What are some different types of security policies? Why is it important to have and follow a security policy? Chapter 16: Suggested Class Discussions

18 Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Best Practices  An employee that has been released from a company has a laptop protected with a fingerprint scanner. Research different vendor methods for recovering access to this laptop that is protected by a fingerprint scanner.  Have the students research different Windows security policies.  Give the students the following scenarios and have them create the appropriate security policy: Users in a small company get a lot of e-mail attachments. Create a policy that allows only certain file types to be contained in an e-mail attachment folder. Set up a software policy that will only affect those users that share a computer, such as part-time staff.

19 Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 16: Outside Reading  National Security Agency http://www.nsa.gov/  Verisign http://www.verisign.com/

20 Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential

21 Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential


Download ppt "© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter."

Similar presentations


Ads by Google