SlideShare une entreprise Scribd logo
1  sur  17
IT Essentials PC Hardware
  and Software 4.1

  Instructional Resource
  Chapter 9: Fundamental
  Security




Presentation_ID               © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Chapter 9: Objectives
            Explain why security is important.
            Describe security threats.
            Identify security procedures.
            Identify common preventive maintenance techniques for security.
            Troubleshoot security.




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
Chapter 9: Critical Concepts
            What is this chapter about and why is it important?
            This chapter details security concepts including security threats, security policy
             components, security implementation, preventive procedures, and common security
             problems.
            Security is a vital part of computing and networking. IP version 4 was not meant as a
             secure protocol. It was developed to share information across a network
             environment. Because of maliciousness and business involvement, pop-ups,
             viruses, invasion of privacy, and spyware have evolved. According to a business
             advisory council, security must be taught in all classes in all aspects of computing.
             Every person involved with a computer must be made aware of security threats and
             measures that can be used to protect data and computerized equipment.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
Chapter 9: Activities
            What activities are associated with this chapter?
                  9.1 Worksheet: Security Attacks
                  9.2.1 Worksheet: Third-Party Anti-Virus Software
                  9.3.4 Packet Tracer Activity: Connecting Wireless PCs to a Linksys WRT300N
                  9.4.2 Worksheet: Operating System Updates
                  9.5.2 Worksheet: Gather Information from the Customer
                  Chapter 9 Quiz




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
Chapter 9: New Terms
            What terms are introduced in this chapter?



                  ActiveX                                                                   9.2.2

                  adware                                                                    9.2.3

                  biometric device                                                          9.3.3

                  card key                                                                  9.3.2

                  Denial of Service (DoS)                                                   9.2.4

                  Distributed Denial of Service (DDoS)                                      9.2.7

                  DNS poisoning                                                             9.2.7

                  encryption                                                                9.3.3

                  grayware                                                                  9.2.3

                  Java                                                                      9.2.2




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   5
Chapter 9: New Terms (continued)
            What terms are introduced in this chapter?



                  JavaScript                                                                                 9.2.2

                  Lightweight Extensible Authentication Protocol (LEAP)                                      9.3.4

                  malware                                                                                    9.2.3

                  man-in-the-middle                                                                          9.2.7

                  phishing                                                                                   9.2.3

                  replay attack                                                                              9.2.7

                  Service Set Identifier (SSID)                                                              9.3.4

                  social engineering                                                                         9.2.6

                  spam                                                                                       9.2.5

                  spoof                                                                                      9.2.7




Presentation_ID                                                           © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
Chapter 9: New Terms (continued)
            What terms are introduced in this chapter?



                  SYN flood                                                                     9.2.7

                  Trojan threat                                                                 9.2.1

                  virus                                                                         9.2.1

                  Wi-Fi Protected Access (WPA)                                                  9.3.4

                  Wi-Fi Protected Access 2 (WPA2)                                               9.3.4

                  Wired Equivalent Privacy (WEP)                                                9.3.4

                  wireless network                                                              9.3.4

                  Wireless Transport Layer Security (WTLS)                                      9.3.4

                  worm                                                                          9.2.1

                  zombie                                                                        9.2.4




Presentation_ID                                              © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   7
Chapter 9: Changes
            What has changed from the previous version (4.0) of ITEPC?
                  Page 9.2.8 Explain data wiping, hard drive destruction, and recycling
                  • Data wiping


                  Page 9.3.1 Explain what is required in a basic local security policy
                  • Compliance
                  • Classification


                  Page 9.3.2 Explain the tasks required to protect physical equipment
                  • Intrusion detection
                  • Trusted Platform Module (TPM)




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
Chapter 9: Changes (continued)
           What has changed from the previous version (4.0) of ITEPC?
             Page 9.3.3 Describe ways to protect data
             • Data Encryption
             • Software Firewall
             • Data Backups
             • Smart Card Security
             • Biometric Security
             • File System Security

                  Page 9.3.4 Describe wireless security techniques
                  • SSID
                  • MAC Filtering
                  • WEP
                  • WPA
                  • WPA2
                  • LEAP


Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
Chapter 9: Changes (continued)
           What has changed from the previous version (4.0) of ITEPC?
                  Page 9.5.1 Review the troubleshooting process
                  • Identify the Problem
                  • Establish a Theory of Probable Causes
                  • Determine an Exact Cause
                  • Implement a Solution
                  • Verify Solution and Full System Functionality
                  • Document Findings




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
Chapter 9: Classroom Management
            Wireless is a great way to teach security. Authentication and encryption can be
             applied one at a time, and then have students access the wireless network by
             applying the appropriate credentials.
            Search the Internet for current virus and malware attacks and any trends in attacks.
            Access Microsoft TechNet Security bulletins to see specific problems and
             vulnerabilities in any particular operating system.
            Students can wipe old hard drives with lower capacities to prepare them for
             donation. Some hard drive companies have data wiping software that can be
             demonstrated during this section.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
Chapter 9: Teaching Analogies
            A computer is like a bank that has gold stored in it. When this bank was built, it did
             not have a vault or locks on the windows and doors. The bank is very susceptible to
             theft in this condition. Over time, the bank builders have learned how to lock the
             doors, build a vault, and guard the bank. The operating system patches and design
             changes that have been made to safeguard the computer are like the lockable
             doors on the bank. The anti-virus and other software that scans for spyware and
             malware are like the vault that protects the gold. The firewall that protects the
             computer is like the professionals who guard the bank.




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   12
Chapter 9: Suggested Class Discussion
                 What is an application vendor’s responsibility when security holes are found in the
                  vendor’s product?
                 What are the penalties for software piracy?
                   • Access the Business Software Alliance web site to see how to report piracy
                      anonymously.
                 What free anti-virus, anti-spam, and anti-spyware tools are available?
                 How can firewalls help to block viruses, spam, and spyware?
                 How do music and video piracy relate to computer security issues?
                 What is war driving? Is it legal?




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   13
Chapter 9: Best Practices

                 Have the students determine how many wireless networks are present in their
                  neighborhood.
                 Use the Internet to research legislation and fines that are related to computer
                  hacking with the words: lawsuits fines computer hacking.




Presentation_ID                                           © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14
Chapter 9: Outside Reading
                 National Security Agency
                  http://www.nsa.gov/

                 Verisign
                  http://www.verisign.com/




Presentation_ID                              © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   15
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   16
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   17

Contenu connexe

Tendances

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
End2end resilience
End2end resilienceEnd2end resilience
End2end resilience
muhammadz24
 

Tendances (6)

Skyjacking A Cisco WLAN - What it means and how to protect against it?
Skyjacking A Cisco WLAN - What it means and how to protect against it?Skyjacking A Cisco WLAN - What it means and how to protect against it?
Skyjacking A Cisco WLAN - What it means and how to protect against it?
 
Collaborative Contingency in the Cloud
Collaborative Contingency in the CloudCollaborative Contingency in the Cloud
Collaborative Contingency in the Cloud
 
Isday 2017 - Atelier Cisco
Isday 2017 - Atelier CiscoIsday 2017 - Atelier Cisco
Isday 2017 - Atelier Cisco
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
End2end resilience
End2end resilienceEnd2end resilience
End2end resilience
 

En vedette

CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
Irsandi Hasan
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
Irsandi Hasan
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
Irsandi Hasan
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
Irsandi Hasan
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
Irsandi Hasan
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
Irsandi Hasan
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
Irsandi Hasan
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
Irsandi Hasan
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
Irsandi Hasan
 

En vedette (20)

CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
ITE - Chapter 7
ITE - Chapter 7ITE - Chapter 7
ITE - Chapter 7
 

Similaire à ITE - Chapter 9

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Dhaval Dave
 
VxWorks - Holistic Security (Art of Testing)
VxWorks - Holistic Security (Art of  Testing)VxWorks - Holistic Security (Art of  Testing)
VxWorks - Holistic Security (Art of Testing)
Aditya K Sood
 
Smartphone Challenge: Guidelines for development of network friendly applicat...
Smartphone Challenge: Guidelines for development of network friendly applicat...Smartphone Challenge: Guidelines for development of network friendly applicat...
Smartphone Challenge: Guidelines for development of network friendly applicat...
Daniel Appelquist
 
Finjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White PaperFinjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White Paper
Elliott Lowe
 
The Future of Direct Communications Technologies and Proximity-based Applicat...
The Future of Direct Communications Technologies and Proximity-based Applicat...The Future of Direct Communications Technologies and Proximity-based Applicat...
The Future of Direct Communications Technologies and Proximity-based Applicat...
ReportLinker.com
 
Study Wireless Security Deployment - PKL
Study Wireless Security Deployment  - PKLStudy Wireless Security Deployment  - PKL
Study Wireless Security Deployment - PKL
Aaron ND Sawmadal
 

Similaire à ITE - Chapter 9 (20)

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Final taxo
Final taxoFinal taxo
Final taxo
 
Smart cloud - single to multi cloud
Smart cloud - single to multi cloud Smart cloud - single to multi cloud
Smart cloud - single to multi cloud
 
VxWorks - Holistic Security (Art of Testing)
VxWorks - Holistic Security (Art of  Testing)VxWorks - Holistic Security (Art of  Testing)
VxWorks - Holistic Security (Art of Testing)
 
Smartphone Challenge: Guidelines for development of network friendly applicat...
Smartphone Challenge: Guidelines for development of network friendly applicat...Smartphone Challenge: Guidelines for development of network friendly applicat...
Smartphone Challenge: Guidelines for development of network friendly applicat...
 
Table of contents
Table of contentsTable of contents
Table of contents
 
Finjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White PaperFinjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White Paper
 
Building Microservices with Micronaut: A Full-Stack JVM-Based Framework
Building Microservices with Micronaut:  A Full-Stack JVM-Based FrameworkBuilding Microservices with Micronaut:  A Full-Stack JVM-Based Framework
Building Microservices with Micronaut: A Full-Stack JVM-Based Framework
 
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
 
Building a chain of trust from the device to the cloud in 5G
Building a chain of trust from the device to the cloud in 5GBuilding a chain of trust from the device to the cloud in 5G
Building a chain of trust from the device to the cloud in 5G
 
ITE - Chapter 12
ITE - Chapter 12ITE - Chapter 12
ITE - Chapter 12
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
Dedicated Hosting
Dedicated HostingDedicated Hosting
Dedicated Hosting
 
The Future of Direct Communications Technologies and Proximity-based Applicat...
The Future of Direct Communications Technologies and Proximity-based Applicat...The Future of Direct Communications Technologies and Proximity-based Applicat...
The Future of Direct Communications Technologies and Proximity-based Applicat...
 
ITE - Chapter 8
ITE - Chapter 8ITE - Chapter 8
ITE - Chapter 8
 
Study Wireless Security Deployment - PKL
Study Wireless Security Deployment  - PKLStudy Wireless Security Deployment  - PKL
Study Wireless Security Deployment - PKL
 
Implementing Cisco Network Security Exam (210-260)
Implementing Cisco Network Security Exam (210-260)Implementing Cisco Network Security Exam (210-260)
Implementing Cisco Network Security Exam (210-260)
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 

Plus de Irsandi Hasan

Plus de Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

ITE - Chapter 9

  • 1. IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 9: Fundamental Security Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Chapter 9: Objectives  Explain why security is important.  Describe security threats.  Identify security procedures.  Identify common preventive maintenance techniques for security.  Troubleshoot security. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 9: Critical Concepts  What is this chapter about and why is it important?  This chapter details security concepts including security threats, security policy components, security implementation, preventive procedures, and common security problems.  Security is a vital part of computing and networking. IP version 4 was not meant as a secure protocol. It was developed to share information across a network environment. Because of maliciousness and business involvement, pop-ups, viruses, invasion of privacy, and spyware have evolved. According to a business advisory council, security must be taught in all classes in all aspects of computing. Every person involved with a computer must be made aware of security threats and measures that can be used to protect data and computerized equipment. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Chapter 9: Activities  What activities are associated with this chapter? 9.1 Worksheet: Security Attacks 9.2.1 Worksheet: Third-Party Anti-Virus Software 9.3.4 Packet Tracer Activity: Connecting Wireless PCs to a Linksys WRT300N 9.4.2 Worksheet: Operating System Updates 9.5.2 Worksheet: Gather Information from the Customer Chapter 9 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Chapter 9: New Terms  What terms are introduced in this chapter? ActiveX 9.2.2 adware 9.2.3 biometric device 9.3.3 card key 9.3.2 Denial of Service (DoS) 9.2.4 Distributed Denial of Service (DDoS) 9.2.7 DNS poisoning 9.2.7 encryption 9.3.3 grayware 9.2.3 Java 9.2.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Chapter 9: New Terms (continued)  What terms are introduced in this chapter? JavaScript 9.2.2 Lightweight Extensible Authentication Protocol (LEAP) 9.3.4 malware 9.2.3 man-in-the-middle 9.2.7 phishing 9.2.3 replay attack 9.2.7 Service Set Identifier (SSID) 9.3.4 social engineering 9.2.6 spam 9.2.5 spoof 9.2.7 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Chapter 9: New Terms (continued)  What terms are introduced in this chapter? SYN flood 9.2.7 Trojan threat 9.2.1 virus 9.2.1 Wi-Fi Protected Access (WPA) 9.3.4 Wi-Fi Protected Access 2 (WPA2) 9.3.4 Wired Equivalent Privacy (WEP) 9.3.4 wireless network 9.3.4 Wireless Transport Layer Security (WTLS) 9.3.4 worm 9.2.1 zombie 9.2.4 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Chapter 9: Changes  What has changed from the previous version (4.0) of ITEPC? Page 9.2.8 Explain data wiping, hard drive destruction, and recycling • Data wiping Page 9.3.1 Explain what is required in a basic local security policy • Compliance • Classification Page 9.3.2 Explain the tasks required to protect physical equipment • Intrusion detection • Trusted Platform Module (TPM) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Chapter 9: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 9.3.3 Describe ways to protect data • Data Encryption • Software Firewall • Data Backups • Smart Card Security • Biometric Security • File System Security Page 9.3.4 Describe wireless security techniques • SSID • MAC Filtering • WEP • WPA • WPA2 • LEAP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Chapter 9: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 9.5.1 Review the troubleshooting process • Identify the Problem • Establish a Theory of Probable Causes • Determine an Exact Cause • Implement a Solution • Verify Solution and Full System Functionality • Document Findings Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Chapter 9: Classroom Management  Wireless is a great way to teach security. Authentication and encryption can be applied one at a time, and then have students access the wireless network by applying the appropriate credentials.  Search the Internet for current virus and malware attacks and any trends in attacks.  Access Microsoft TechNet Security bulletins to see specific problems and vulnerabilities in any particular operating system.  Students can wipe old hard drives with lower capacities to prepare them for donation. Some hard drive companies have data wiping software that can be demonstrated during this section. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Chapter 9: Teaching Analogies  A computer is like a bank that has gold stored in it. When this bank was built, it did not have a vault or locks on the windows and doors. The bank is very susceptible to theft in this condition. Over time, the bank builders have learned how to lock the doors, build a vault, and guard the bank. The operating system patches and design changes that have been made to safeguard the computer are like the lockable doors on the bank. The anti-virus and other software that scans for spyware and malware are like the vault that protects the gold. The firewall that protects the computer is like the professionals who guard the bank. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Chapter 9: Suggested Class Discussion  What is an application vendor’s responsibility when security holes are found in the vendor’s product?  What are the penalties for software piracy? • Access the Business Software Alliance web site to see how to report piracy anonymously.  What free anti-virus, anti-spam, and anti-spyware tools are available?  How can firewalls help to block viruses, spam, and spyware?  How do music and video piracy relate to computer security issues?  What is war driving? Is it legal? Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Chapter 9: Best Practices  Have the students determine how many wireless networks are present in their neighborhood.  Use the Internet to research legislation and fines that are related to computer hacking with the words: lawsuits fines computer hacking. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Chapter 9: Outside Reading  National Security Agency http://www.nsa.gov/  Verisign http://www.verisign.com/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17