basic security
DESCRIPTION
Basic Security. Networking for Home and Small Businesses – Chapter 8. Objectives. Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/1.jpg)
© 2007 Cisco Systems, Inc. All rights reserved. Cisco PublicITE PC v4.0Chapter 1 1
Basic Security
Networking for Home and Small Businesses – Chapter 8
![Page 2: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/2.jpg)
ITE PC v4.0Chapter 1 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Objectives Identify and describe the various networking threats.
Identify different methods of attack.
Describe security procedures and applications.
Describe the features of a firewall and how it can be used to protect against an attack.
![Page 3: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/3.jpg)
ITE PC v4.0Chapter 1 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Networking Threats Describe major risks of network intrusion
![Page 4: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/4.jpg)
ITE PC v4.0Chapter 1 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Networking Threats Define the sources of network intrusion.
![Page 5: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/5.jpg)
ITE PC v4.0Chapter 1 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Networking Threats Describe social engineering and phishing
![Page 6: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/6.jpg)
ITE PC v4.0Chapter 1 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Methods of Attack Describe viruses, worms, and Trojan horses.
![Page 7: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/7.jpg)
ITE PC v4.0Chapter 1 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Methods of Attack Denial of Service and Brute Force attacks
![Page 8: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/8.jpg)
ITE PC v4.0Chapter 1 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Methods of Attack Describe spyware, tracking cookies, adware and pop-
ups.
![Page 9: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/9.jpg)
ITE PC v4.0Chapter 1 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Methods of Attack Describe Spam
![Page 10: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/10.jpg)
ITE PC v4.0Chapter 1 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications Defining a security policy
![Page 11: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/11.jpg)
ITE PC v4.0Chapter 1 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications Define common security procedures
![Page 12: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/12.jpg)
ITE PC v4.0Chapter 1 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications Describe how updates and patches relate to security
issues.
![Page 13: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/13.jpg)
ITE PC v4.0Chapter 1 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications Anti-virus software
![Page 14: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/14.jpg)
ITE PC v4.0Chapter 1 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications SPAM prevention
![Page 15: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/15.jpg)
ITE PC v4.0Chapter 1 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications Anti-Spyware
![Page 16: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/16.jpg)
ITE PC v4.0Chapter 1 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Firewall Features and How to Use them to Protect Against an Attack What is a firewall?
![Page 17: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/17.jpg)
ITE PC v4.0Chapter 1 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Firewall Features and How to Use them to Protect Against an Attack Using a Firewall to Protect Against an Attack
![Page 18: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/18.jpg)
ITE PC v4.0Chapter 1 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Firewall Features and How to Use them to Protect Against an Attack Vulnerability Analysis
![Page 19: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/19.jpg)
ITE PC v4.0Chapter 1 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Firewall Features and How to Use them to Protect Against an Attack Security Best Practices
![Page 20: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/20.jpg)
ITE PC v4.0Chapter 1 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Summary Networks can be open to intrusion through
vulnerabilities in software, hardware attacks, or the weaknesses of individuals.
Effective network security is based on a variety of products and services, combined with a thorough security policy.
A firewall controls traffic between networks and helps prevent unauthorized access.
![Page 21: Basic Security](https://reader035.vdocuments.site/reader035/viewer/2022062517/56813bfb550346895da549c9/html5/thumbnails/21.jpg)
ITE PC v4.0Chapter 1 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public