Contenu connexe
Similaire à CCNA Discovery 1 - Chapter 8
Similaire à CCNA Discovery 1 - Chapter 8 (20)
Plus de Irsandi Hasan (20)
CCNA Discovery 1 - Chapter 8
- 1. Basic Security
Networking for Home and Small Businesses – Chapter
8
Version 4.0 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
- 2. Objectives
Identify and describe the various networking threats.
Identify different methods of attack.
Describe security procedures and applications.
Describe the features of a firewall and how it can be
used to protect against an attack.
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
- 6. Methods of Attack
Describe viruses, worms, and Trojan horses.
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
- 7. Methods of Attack
Denial of Service and Brute Force attacks
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
- 8. Methods of Attack
Describe spyware, tracking cookies, adware and pop-
ups.
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
- 9. Methods of Attack
Describe Spam
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
- 10. Security Procedures and Applications
Defining a security policy
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
- 11. Security Procedures and Applications
Define common security procedures
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
- 12. Security Procedures and Applications
Describe how updates and patches relate to security
issues.
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
- 13. Security Procedures and Applications
Anti-virus software
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
- 14. Security Procedures and Applications
SPAM prevention
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
- 15. Security Procedures and Applications
Anti-Spyware
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
- 16. Firewall Features and How to Use them to
Protect Against an Attack
What is a firewall?
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
- 17. Firewall Features and How to Use them to
Protect Against an Attack
Using a Firewall to Protect Against an Attack
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
- 18. Firewall Features and How to Use them to
Protect Against an Attack
Vulnerability Analysis
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
- 19. Firewall Features and How to Use them to
Protect Against an Attack
Security Best Practices
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
- 20. Summary
Networks can be open to intrusion through
vulnerabilities in software, hardware attacks, or the
weaknesses of individuals.
Effective network security is based on a variety of
products and services, combined with a thorough
security policy.
A firewall controls traffic between networks and helps
prevent unauthorized access.
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
- 21. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21