Download presentation
Presentation is loading. Please wait.
Published byMarcia McBride Modified over 9 years ago
1
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8
2
ITE PC v4.0 Chapter 1 2 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Objectives Describe ISP security policies and procedures Describe the tools used in implementing security at the ISP Describe the monitoring and managing of the ISP Describe the responsibilities of the ISP with regard to maintenance and recovery
3
ITE PC v4.0 Chapter 1 3 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ISP Security Policies and Procedures Identify and describe best practices for ISP security
4
ITE PC v4.0 Chapter 1 4 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ISP Security Policies and Procedures Describe the three-step process used by administrators to reduce network vulnerability.
5
ITE PC v4.0 Chapter 1 5 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ISP Security Policies and Procedures Encryption
6
ITE PC v4.0 Chapter 1 6 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Tools used in Implementing Security at the ISP Describe the purpose of access lists and port filtering
7
ITE PC v4.0 Chapter 1 7 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Tools used in Implementing Security at the ISP Describe the purpose of firewalls
8
ITE PC v4.0 Chapter 1 8 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Tools used in Implementing Security at the ISP Identify and describe devices and applications that are available to prevent network intrusion.
9
ITE PC v4.0 Chapter 1 9 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Tools used in Implementing Security at the ISP - Wireless Security Describe the different security methods used to secure wireless networks.
10
ITE PC v4.0 Chapter 1 10 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Tools used in Implementing Security at the ISP Describe the use of host-based firewalls and anti-X software to secure servers on a network
11
ITE PC v4.0 Chapter 1 11 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Monitoring and Managing the ISP Describe the purpose of a Service Level Agreement
12
ITE PC v4.0 Chapter 1 12 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Monitoring and Managing the ISP Describe methods that network administrators can use to monitor link performance
13
ITE PC v4.0 Chapter 1 13 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ISP Responsibility for Maintenance and Recovery Describe file backup methods and services offered by the ISP
14
ITE PC v4.0 Chapter 1 14 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ISP Responsibility for Maintenance and Recovery Identify and describe best practices for disaster recovery
15
ITE PC v4.0 Chapter 1 15 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ISP Responsibility for Maintenance and Recovery Identify and describe best practices for disaster recovery
16
ITE PC v4.0 Chapter 1 16 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Summary ISPs provide desktop security services for customers, such as creating passwords, implementing patches and updates, and assigning permissions. Many protocols offer secure versions utilizing digital encryption, which should be used when the data being exchanged is confidential. Port filtering and Access Lists use TCP and UDP port features to permit or deny traffic. Firewalls can utilize hardware or software to define what traffic can come into or go out of parts of a network. ISPs are responsible for providing efficient and effective backup and disaster recovery methods for their customers.
17
ITE PC v4.0 Chapter 1 17 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.