Download presentation
Presentation is loading. Please wait.
Published byEgbert Lee Modified over 9 years ago
1
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8
2
ITE PC v4.0 Chapter 1 2 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Objectives Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications. Describe the features of a firewall and how it can be used to protect against an attack.
3
ITE PC v4.0 Chapter 1 3 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Networking Threats Describe major risks of network intrusion
4
ITE PC v4.0 Chapter 1 4 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Networking Threats Define the sources of network intrusion.
5
ITE PC v4.0 Chapter 1 5 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Networking Threats Describe social engineering and phishing
6
ITE PC v4.0 Chapter 1 6 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Methods of Attack Describe viruses, worms, and Trojan horses.
7
ITE PC v4.0 Chapter 1 7 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Methods of Attack Denial of Service and Brute Force attacks
8
ITE PC v4.0 Chapter 1 8 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Methods of Attack Describe spyware, tracking cookies, adware and pop- ups.
9
ITE PC v4.0 Chapter 1 9 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Methods of Attack Describe Spam
10
ITE PC v4.0 Chapter 1 10 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Procedures and Applications Defining a security policy
11
ITE PC v4.0 Chapter 1 11 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Procedures and Applications Define common security procedures
12
ITE PC v4.0 Chapter 1 12 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Procedures and Applications Describe how updates and patches relate to security issues.
13
ITE PC v4.0 Chapter 1 13 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Procedures and Applications Anti-virus software
14
ITE PC v4.0 Chapter 1 14 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Procedures and Applications SPAM prevention
15
ITE PC v4.0 Chapter 1 15 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Procedures and Applications Anti-Spyware
16
ITE PC v4.0 Chapter 1 16 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Firewall Features and How to Use them to Protect Against an Attack What is a firewall?
17
ITE PC v4.0 Chapter 1 17 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Firewall Features and How to Use them to Protect Against an Attack Using a Firewall to Protect Against an Attack
18
ITE PC v4.0 Chapter 1 18 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Firewall Features and How to Use them to Protect Against an Attack Vulnerability Analysis
19
ITE PC v4.0 Chapter 1 19 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Firewall Features and How to Use them to Protect Against an Attack Security Best Practices
20
ITE PC v4.0 Chapter 1 20 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Summary Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals. Effective network security is based on a variety of products and services, combined with a thorough security policy. A firewall controls traffic between networks and helps prevent unauthorized access.
21
ITE PC v4.0 Chapter 1 21 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.