SlideShare una empresa de Scribd logo
1 de 44
Chapter 10: 
Security 
IT Essentials 5.0 
© 2008 Cisco Systems, Inc. All rights reserved. Presentation_ID Cisco Confidential 1
Chapter 10 Objectives 
 10.0 Explain why security is important 
 10.1 Describe security threats 
 10.2 Identify security procedures 
 10.3 Identify common preventive maintenance 
techniques for security 
 10.4 Troubleshoot security 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
The Importance of Security 
 Private information, 
company secrets, financial 
data, computer equipment, 
and items of national 
security are placed at risk if 
proper security procedures 
are not followed. 
 A technician’s primary 
responsibilities include data 
and network security. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Security Threats 
Potential threats to computer security: 
 Internal threats 
•Employees can cause a malicious threat or an accidental threat. 
 External threats 
•Outside users can attack in an unstructured or structured way. 
Types of attacks to computer security: 
 Physical 
•Theft, damage, or destruction to computer equipment. 
 Data 
•Removal, corruption, denial of access, unauthorized access, or theft 
of information. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Adware, Spyware and Phishing 
Malicious software (malware) is any software designed 
to damage or to disrupt a system: 
 Adware - software program that displays advertising on 
your computer, often displayed in a pop-up window. 
 Spyware - distributed without user intervention or 
knowledge, monitors activity on the computer. 
 Phishing - attacker pretends to represent a legitimate 
organization and asks for verification of victims 
information such as password or username. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Viruses, Worms, Trojans, and Rootkits 
 Virus is a software code that is deliberately created by an 
attacker. Viruses may collect sensitive information or may 
alter or destroy information. 
 A worm is a self-replicating program that uses the network 
to duplicate its code to the hosts on the network. At a 
minimum, worms consume bandwidth in a network. 
 A Trojan is malicious software that is disguised as a 
legitimate program. It is named for its method of getting past 
computer defenses by pretending to be something useful. 
 Anti-virus software is designed to detect, disable, and 
remove viruses, worms, and Trojan horses before they infect 
a computer. 
 A Rootkit is a malicious program that gains full access to a 
computer system. Often, a direct attack on a system using a 
known vulnerability or password. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Web Security 
Tools that make web pages powerful can make computers vulnerable: 
 Active X - Controls interactivity on web pages. 
 Java - Allows applets to run within a browser. 
 Java Script - Interacts with HTML source code to allow interactive web sites. 
 Adobe Flash - used to create interactive media (animation, video and games) 
for the web. 
 Microsoft Silverlight -used to create rich, interactive media for the web, 
similar to flash. 
Most browsers have settings to help prevent these attacks, for example: 
 ActiveX filtering 
 Pop-up Blockers 
 SmartScreen Filter (Internet Explorer) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
InPrivate Browsing 
 InPrivate browsing prevents the web browser from 
storing the following information: 
• Usernames 
• Passwords 
• Cookies 
• Browsing history 
• Temporary Internet files 
• Form data 
 The browser stores temporary files and cookies but the information 
is deleted when InPrivate session is ended. 
 To start InPrivate Browsing in Windows 7: 
•Right-Click Internet Explorer > Start InPrivate Browsing 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Spam 
 Spam is unsolicited email 
that can be used to send 
harmful links or deceptive 
content. 
 Popups are windows that 
automatically open and 
are designed to capture 
your attention and lead 
you to advertising sites. 
Use anti-virus software, options in e-mail software, popup 
blockers, and common indications of spam to combat 
these. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
TCP/IP Attacks 
TCP/IP suite controls communication on the Internet. Can be 
manipulated to prevents users from accessing normal services. 
• Denial of Service (DoS) - sending enough requests to overload a 
resource or even stopping its operation. 
• Distributed DoS (DDoS) - an attack launched from many computers, 
called zombies or botnets. 
• SYN Flood - randomly opens TCP ports at the source of the attack 
and ties up the computer with a large amount of false SYN requests. 
• Spoofing - uses a forged IP or MAC address to impersonate a trusted 
computer. 
• Man-in-the-Middle - intercepting communications between computers 
to steal information transiting through the network. 
• Replay - data transmissions are intercepted and recorded by an 
attacker, then replayed to gain access. 
•DNS Poisoning - changing DNS records to point to imposter servers. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Social Engineering 
 A social engineer is a person who is able 
to gain access to equipment or a network 
by tricking people into providing the 
necessary access information. 
 To protect against social engineering: 
• Never give out a password. 
• Always ask for the ID of the unknown person. 
• Restrict access of visitors. 
• Escort all visitors. 
• Never post your password. 
• Lock your computer when you leave your desk. 
• Do not let anyone follow you through a door that 
requires an access card. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Hard Drive Disposal and Recycling 
 Erase all hard drives, then use a third-party data wiping tool 
to fully erase all data. 
 Degaussing disrupts or eliminates the magnetic field on a 
hard drive that allow for the storage of data. A degaussing tool 
is very expensive and not practical for most users. 
 The only way to fully ensure that data cannot be recovered 
from a hard drive is to carefully shatter the platters with a 
hammer and safely dispose of the pieces. 
 To destroy software media (floppy disks and CDs), use 
a shredding machine designed for shredding these materials. 
 Hard Drive Recycling - Hard drives that do not contain 
sensitive data can be reformatted and used in other 
computers. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Security Policy 
 A security policy should 
describe how a company 
addresses security issues 
 Questions to answer in writing 
a local security policy: 
•What assets require protection? 
•What are the possible threats? 
•What should be done in the event 
of a security breach? 
•What training will be in place to 
educate the end users? 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Security Policy Requirements 
A security policy should address these key areas: 
 Process for handling network security incidents 
 Process to audit existing network security 
 General security framework for implementing network security 
 Behaviors that are allowed 
 Behaviors that are prohibited 
 What to log and how to store the logs: Event Viewer, system log 
files, or security log files 
 Network access to resources through account permissions 
 Authentication technologies to access data: usernames, 
passwords, biometrics, and smart cards 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Usernames and Passwords 
Username and Password policies: 
 Change the default username for accounts such as 
administrator or guest. 
 Network admin defines a naming convention for 
usernames. 
 Three levels of password protection are recommended: 
•BIOS 
•Login 
•Network 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Password Requirements 
Guidelines for creating strong passwords: 
 Length - Use at least eight characters. 
 Complexity - Include letters, numbers, symbols, and 
punctuation. Use a variety of keys on the keyboard, not 
just common letters and characters. 
 Variation - Change passwords often. Set a reminder to 
change the passwords you have for email, banking, 
and credit card websites on the average of every three 
to four months. 
 Variety - Use a different password for each site or 
computer that you use. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
File and Folder Permissions 
 Permission levels are configured to limit individual or group user 
access to specific data. 
 NTFS – File system that uses journals which are special areas 
where file changes are recorded before changes are made. 
• Can log access by user, date, and time. 
• Has encryption capability. 
 FAT 32 - no encryption or journaling 
 Principle of Least Privilege - only allow users access to the 
resources they need. 
 Restricting User Permissions-. If an individual or a group is 
denied permissions to a network share, this denial overrides any 
other permissions given. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Protecting Data 
The value of physical equipment is often far less than the value of 
the data it contains. To protect data, there are several methods 
of security protection that can be implemented. 
 Software Firewall 
 Smartcard Security 
 Biometric Security 
 Data backups 
 Data encryption 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Data Encryption 
 Encryption - data is transformed using a complicated 
algorithm to make it unreadable. 
 Encrypting File System (EFS) is a Windows feature that 
can encrypt data. 
 BitLocker can encrypt the entire hard drive volume 
included in Windows 7 and Windows Vista Ultimate and 
Enterprise editions. 
 Trusted Platform Module (TPM) is a specialized chip 
installed on the motherboard to be used for hardware and 
software authentication. 
•TPM stores information specific to the host system, such as 
encryption keys, digital certificates, and passwords. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Malware Software Protection Programs 
 Malware is malicious software that is installed on a 
computer without the knowledge or permission of the 
user. 
 It may take several different anti-malware programs 
and multiple scans to completely remove all malicious 
software. 
 Anti-malware available for these purpose are: Anti-virus, 
anti-spyware, anti-adware, and phishing 
programs. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Signature File Updates 
 New viruses are always being developed, therefore 
security software must be continually updated. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Common Communication Encryption 
Types 
 Hash Encoding uses a mathematical function 
to create a numeric value that is unique to the 
data. 
 Symmetric Encryption requires both sides of 
an encrypted conversation to use an encryption 
key to encode and decode the data. 
 Asymmetric Encryption requires two keys, a 
private key and a public key. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Service Set Identifiers 
 The Service Set Identifier (SSID) is the name of the wireless 
network. A wireless router or access point broadcasts the SSID by 
default so that wireless devices can detect the wireless network. 
 To disable SSID broadcasting, use the following path, as shown in 
the figure: 
 Wireless > Basic Wireless Settings > select Disabled for SSID 
Broadcast > Save Settings > Continue 
 Disabling the SSID broadcast provides very little security. If the 
SSID broadcast is disabled, each computer user that wants to 
connect to the wireless network must enter the SSID manually. 
When a computer is searching for a wireless network, it will 
broadcast the SSID. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Mac Address Filtering 
 MAC address filtering is a technique used to deploy 
device-level security on a wireless LAN. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Wireless Security Modes 
 Wired Equivalent Privacy (WEP) – The first 
generation security standard for wireless. Attackers 
quickly discovered that WEP encryption was easy to 
break. 
 Wi-Fi Protected Access (WPA) An improved version 
of WEP, uses much stronger encryption. 
 Wi-Fi Protected Access 2 (WPA2) WPA2 supports 
robust encryption, providing government-grade security. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Wireless Access 
 Wireless Antennae 
• Avoid transmitting signals outside of the network area by 
installing an antenna with a pattern that serves your network 
users. 
 Network Device Access 
• On first connection to the network device, change the default 
username and password. 
 Wi-Fi Protected Setup (WPS) 
• The user connects to the wireless router using the factory-set 
PIN that is either printed on a sticker or shown on a display. 
• Software has been developed that can intercept traffic and 
recover the WPS PIN and the pre-shared encryption key. 
Disable WPS on the wireless router if possible. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Firewalls 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Port Forwarding and Port Triggering 
 Port forwarding is a rule-based method of directing 
traffic between devices on separate networks: 
•Used when specific ports must be opened so that certain 
programs and applications can communicate with devices on 
different networks. 
•Router determines if the traffic should be forwarded to a certain 
device based on the port number found with the traffic. For 
example HTTP – Port 80. 
 Port triggering allows the router to temporarily forward 
data through inbound ports to a specific device. 
•For example, a video game might use ports 27000 to 27100 for 
connecting with other players. These are the trigger ports. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Physical Equipment Protection Methods 
 Physical security is as important as data security. Network 
infrastructure can be protected by: 
• Secured telecommunications rooms, equipment cabinets, and cages 
• Cable locks and security screws for hardware devices 
•Wireless detection for unauthorized access points 
• Hardware firewalls 
• Network management system that detects changes in wiring and patch panels 
 Two- factor Authentication - secured using overlapping 
protection techniques to prevent unauthorized access to sensitive 
data. 
• An example of two-factor authentication is using a password and a smart card 
to protect an asset. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Security Hardware 
 There are several methods of physically protecting computer equipment: 
• Use cable locks with equipment. 
• Keep telecommunication rooms locked. 
• Fit equipment with security screws. 
• Use security cages around equipment. 
• Label and install sensors, such as Radio Frequency Identification (RFID) tags, on 
equipment. 
• Install physical alarms triggered by motion-detection sensors. 
• Use webcams with motion-detection and surveillance software. 
 For access to facilities, there are several means of protection: 
• Card keys that store user data, including level of access 
• Biometric sensors that identify physical characteristics of the user, such as fingerprints or 
retinas 
• Posted security guard 
• Sensors, such as RFID tags, to monitor equipment 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Service Packs and Security Patches 
 Regular security updates are essential to 
combat new viruses or worms. 
 A technician should understand how and 
when to install patches and updates. 
 Patches are code updates that 
manufacturers provide to prevent a newly 
discovered virus or worm from making a 
successful attack 
 A Service Pack is a combination of patches 
and updates. 
 Windows automatically downloads and installs updates 
by default or can be controlled locally; 
• Start > All Programs > Windows Update > Change settings 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Data Backup 
 Windows backups can be done manually or scheduled 
to takes place automatically. 
 To start the Windows 7 Backup Files wizard for the first 
time, use the following path: 
Start> All Programs > Maintenance >Backup and Restore 
>Set up backup 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Configuring Firewall Types 
 A Firewall selectively denies traffic to a computer or 
network segment. 
 Restrictive security policy - A firewall that opens only 
the required ports. Any packet not explicitly permitted is 
denied. 
 Configuring the Windows 7 or Windows Vista firewall 
can be completed in two ways: 
•Automatically - The user is prompted to Keep Blocking, 
Unblock, or Ask Me Later for unsolicited requests. 
•Manage Security Settings – the user adds the program or 
ports that are required for the applications in use on the 
network. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Maintaining Accounts 
 Group employees by job requirements to give access to 
files by setting up group permissions. 
 When an employee leaves an organization, access to 
the network should be terminated immediately. 
 Guests can be given access through a Guest account. 
 To configure all of the 
users and groups on a 
computer, type 
lusrmgr.msc in the 
Search box, or Run Line 
utility. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Troubleshooting Process 
Step 1 Identify the problem 
Step 2 Establish a theory of probable causes 
Step 3 Test the Theory to Determine cause 
Step 4 Establish a Plan of Action to Resolve the Problem 
and Implement the Solution 
Step 5 Verify Full System Functionality and Implement 
Preventative Measures 
Step 6 Document Findings, Actions, and Outcomes 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Step 1 - Identify the Problem 
 System Information 
• Manufacturer, model, OS, network environment, connection type 
 Open-ended questions 
• When did the problem start? 
• What problems are you experiencing? 
• What websites have you visited recently? 
• What security software is installed in your computer? 
• Who else has used your computer recently? 
 Closed-ended questions (Can be answered with a ‘yes’ or ‘no’) 
• Is your security software up to date? 
• Have you scanned your computer recently for viruses? 
• Did you open any attachments from a suspicious e-mail? 
• Have you changed your password recently? 
• Have you shared your password? 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Step 2 - Establish a Theory of Probable 
Cause 
 Create a list of the most common causes of security 
problems: 
•Virus 
•Trojan Horse 
•Worm 
•Spyware 
•Adware 
•Grayware or Malware 
•Phishing scheme 
•Password compromised 
•Unprotected equipment rooms 
•Unsecured work environment 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Step 3 - Test the Theory to Determine cause 
Test theories of probable cause one at a time, starting 
with the quickest and easiest. 
•Disconnect from the network 
•Update anti-virus and spyware signatures 
•Scan computer with protection software 
•Check computer for the latest OS patches and updates 
•Reboot the computer or network device 
•Login as a different user to change your password 
•Secure equipment rooms 
•Secure work environment 
•Enforce security policy 
If the exact cause of the problem has not been 
determined after all theories have been tested, 
establish a new theory of probable cause and test it. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Step 4 - Establish a Plan of Action to Resolve 
the Problem and Implement the Solution 
• After determining the exact cause of the problem, 
establish a plan of action to resolve the problem and 
implement a solution. 
 Sometimes quick procedures can determine the exact 
cause of the problem or even correct the problem. 
 If a quick procedure does not correct the problem, you 
might need to research the problem further to establish 
the exact cause. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Step 5 - Verify Full System Functionality and 
Implement Preventative Measures 
 Verify full system functionality and implement any 
preventive measures if needed. 
•Re-scan computer to ensure no viruses remain. 
•Re-scan computer to ensure no spyware remains. 
•Check the security software logs to ensure no problems remain. 
•Test network and Internet connectivity. 
•Ensure all application are working. 
•Verify access to authorized resources such as shared printer and 
databases.. 
•Make sure entries are secured. 
•Ensure security policy is enforced. 
 Have the customer verify the solution and system 
functionality. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Step 6 - Document Findings, Actions, 
and Outcomes 
 Discuss the solution with the customer 
 Have the customer confirm that the problem has been 
solved 
 Document the process: 
•Problem description 
•Solution 
•Components used 
•Amount of time spent in solving the problem 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Common Problems and Solutions 
 See chart in curriculum of Common Security Problems 
and Solutions 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Chapter 10 Summary 
 Following proper security procedures will protect 
computers and network equipment, and the data they 
contain, from physical danger such as fire and theft, as 
well as from loss and damage by employees and 
attackers. 
 Security threats can come from inside or outside of an 
organization. 
 Viruses and worms are common threats that attack data. 
 Develop and maintain a security plan to protect both data 
and physical equipment from loss. 
 Keep operating systems and applications up to date and 
secure with patches and service packs. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44

Más contenido relacionado

La actualidad más candente

ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1Irsandi Hasan
 
Introduction to Network Applications & Network Services
Introduction to  Network Applications &  Network ServicesIntroduction to  Network Applications &  Network Services
Introduction to Network Applications & Network ServicesMuhammadRizaHilmi
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating systemAnil Dharmapuri
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2Irsandi Hasan
 
Operating System - Unit I - Introduction
Operating System - Unit I - IntroductionOperating System - Unit I - Introduction
Operating System - Unit I - Introductioncscarcas
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
17 roles of window server 2008 r2
17 roles of window server 2008 r217 roles of window server 2008 r2
17 roles of window server 2008 r2IGZ Software house
 
File system.
File system.File system.
File system.elyza12
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and FilteringAisha Talat
 
Network servers
Network serversNetwork servers
Network serversOnline
 

La actualidad más candente (20)

ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Windows 7 install
Windows 7 installWindows 7 install
Windows 7 install
 
Netacad
NetacadNetacad
Netacad
 
Introduction to Network Applications & Network Services
Introduction to  Network Applications &  Network ServicesIntroduction to  Network Applications &  Network Services
Introduction to Network Applications & Network Services
 
Device Drivers
Device DriversDevice Drivers
Device Drivers
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating system
 
Process management
Process managementProcess management
Process management
 
Basic Linux Internals
Basic Linux InternalsBasic Linux Internals
Basic Linux Internals
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
 
Operating System - Unit I - Introduction
Operating System - Unit I - IntroductionOperating System - Unit I - Introduction
Operating System - Unit I - Introduction
 
Putty
PuttyPutty
Putty
 
Windows server
Windows serverWindows server
Windows server
 
Bios vs uefi
Bios vs uefiBios vs uefi
Bios vs uefi
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
File Sever
File SeverFile Sever
File Sever
 
17 roles of window server 2008 r2
17 roles of window server 2008 r217 roles of window server 2008 r2
17 roles of window server 2008 r2
 
File system.
File system.File system.
File system.
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
 
Network servers
Network serversNetwork servers
Network servers
 

Destacado

ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9Irsandi Hasan
 
ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8Irsandi Hasan
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6Irsandi Hasan
 
CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3Irsandi Hasan
 
CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4Irsandi Hasan
 
CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5Irsandi Hasan
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6Irsandi Hasan
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2Irsandi Hasan
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1Irsandi Hasan
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8Irsandi Hasan
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
Mech ug curriculum and syllabus
Mech ug curriculum and syllabusMech ug curriculum and syllabus
Mech ug curriculum and syllabusmanojg1990
 
Helpdesk Service Level Agreements
Helpdesk Service Level AgreementsHelpdesk Service Level Agreements
Helpdesk Service Level AgreementsChristopher Duffy
 

Destacado (20)

ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9
 
ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
IT Essentials Chapter 10
IT Essentials Chapter 10IT Essentials Chapter 10
IT Essentials Chapter 10
 
IT ESSENTIALS 6.0
IT ESSENTIALS 6.0IT ESSENTIALS 6.0
IT ESSENTIALS 6.0
 
CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3
 
CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4
 
CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
ITE - Chapter 10
ITE - Chapter 10ITE - Chapter 10
ITE - Chapter 10
 
Mech ug curriculum and syllabus
Mech ug curriculum and syllabusMech ug curriculum and syllabus
Mech ug curriculum and syllabus
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
ITE - Chapter 3
ITE - Chapter 3ITE - Chapter 3
ITE - Chapter 3
 
Helpdesk Service Level Agreements
Helpdesk Service Level AgreementsHelpdesk Service Level Agreements
Helpdesk Service Level Agreements
 
Censorship in Media
Censorship in MediaCensorship in Media
Censorship in Media
 

Similar a ITE v5.0 - Chapter 10

Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxkris harden
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Signature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 FullSignature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 Fullnoelheng
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024Michael Noel
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 

Similar a ITE v5.0 - Chapter 10 (20)

Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Network security
Network securityNetwork security
Network security
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Signature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 FullSignature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 Full
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 

Más de Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 

Más de Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 

Último

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

ITE v5.0 - Chapter 10

  • 1. Chapter 10: Security IT Essentials 5.0 © 2008 Cisco Systems, Inc. All rights reserved. Presentation_ID Cisco Confidential 1
  • 2. Chapter 10 Objectives  10.0 Explain why security is important  10.1 Describe security threats  10.2 Identify security procedures  10.3 Identify common preventive maintenance techniques for security  10.4 Troubleshoot security Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. The Importance of Security  Private information, company secrets, financial data, computer equipment, and items of national security are placed at risk if proper security procedures are not followed.  A technician’s primary responsibilities include data and network security. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Security Threats Potential threats to computer security:  Internal threats •Employees can cause a malicious threat or an accidental threat.  External threats •Outside users can attack in an unstructured or structured way. Types of attacks to computer security:  Physical •Theft, damage, or destruction to computer equipment.  Data •Removal, corruption, denial of access, unauthorized access, or theft of information. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Adware, Spyware and Phishing Malicious software (malware) is any software designed to damage or to disrupt a system:  Adware - software program that displays advertising on your computer, often displayed in a pop-up window.  Spyware - distributed without user intervention or knowledge, monitors activity on the computer.  Phishing - attacker pretends to represent a legitimate organization and asks for verification of victims information such as password or username. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Viruses, Worms, Trojans, and Rootkits  Virus is a software code that is deliberately created by an attacker. Viruses may collect sensitive information or may alter or destroy information.  A worm is a self-replicating program that uses the network to duplicate its code to the hosts on the network. At a minimum, worms consume bandwidth in a network.  A Trojan is malicious software that is disguised as a legitimate program. It is named for its method of getting past computer defenses by pretending to be something useful.  Anti-virus software is designed to detect, disable, and remove viruses, worms, and Trojan horses before they infect a computer.  A Rootkit is a malicious program that gains full access to a computer system. Often, a direct attack on a system using a known vulnerability or password. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Web Security Tools that make web pages powerful can make computers vulnerable:  Active X - Controls interactivity on web pages.  Java - Allows applets to run within a browser.  Java Script - Interacts with HTML source code to allow interactive web sites.  Adobe Flash - used to create interactive media (animation, video and games) for the web.  Microsoft Silverlight -used to create rich, interactive media for the web, similar to flash. Most browsers have settings to help prevent these attacks, for example:  ActiveX filtering  Pop-up Blockers  SmartScreen Filter (Internet Explorer) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. InPrivate Browsing  InPrivate browsing prevents the web browser from storing the following information: • Usernames • Passwords • Cookies • Browsing history • Temporary Internet files • Form data  The browser stores temporary files and cookies but the information is deleted when InPrivate session is ended.  To start InPrivate Browsing in Windows 7: •Right-Click Internet Explorer > Start InPrivate Browsing Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Spam  Spam is unsolicited email that can be used to send harmful links or deceptive content.  Popups are windows that automatically open and are designed to capture your attention and lead you to advertising sites. Use anti-virus software, options in e-mail software, popup blockers, and common indications of spam to combat these. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. TCP/IP Attacks TCP/IP suite controls communication on the Internet. Can be manipulated to prevents users from accessing normal services. • Denial of Service (DoS) - sending enough requests to overload a resource or even stopping its operation. • Distributed DoS (DDoS) - an attack launched from many computers, called zombies or botnets. • SYN Flood - randomly opens TCP ports at the source of the attack and ties up the computer with a large amount of false SYN requests. • Spoofing - uses a forged IP or MAC address to impersonate a trusted computer. • Man-in-the-Middle - intercepting communications between computers to steal information transiting through the network. • Replay - data transmissions are intercepted and recorded by an attacker, then replayed to gain access. •DNS Poisoning - changing DNS records to point to imposter servers. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Social Engineering  A social engineer is a person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.  To protect against social engineering: • Never give out a password. • Always ask for the ID of the unknown person. • Restrict access of visitors. • Escort all visitors. • Never post your password. • Lock your computer when you leave your desk. • Do not let anyone follow you through a door that requires an access card. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Hard Drive Disposal and Recycling  Erase all hard drives, then use a third-party data wiping tool to fully erase all data.  Degaussing disrupts or eliminates the magnetic field on a hard drive that allow for the storage of data. A degaussing tool is very expensive and not practical for most users.  The only way to fully ensure that data cannot be recovered from a hard drive is to carefully shatter the platters with a hammer and safely dispose of the pieces.  To destroy software media (floppy disks and CDs), use a shredding machine designed for shredding these materials.  Hard Drive Recycling - Hard drives that do not contain sensitive data can be reformatted and used in other computers. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Security Policy  A security policy should describe how a company addresses security issues  Questions to answer in writing a local security policy: •What assets require protection? •What are the possible threats? •What should be done in the event of a security breach? •What training will be in place to educate the end users? Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Security Policy Requirements A security policy should address these key areas:  Process for handling network security incidents  Process to audit existing network security  General security framework for implementing network security  Behaviors that are allowed  Behaviors that are prohibited  What to log and how to store the logs: Event Viewer, system log files, or security log files  Network access to resources through account permissions  Authentication technologies to access data: usernames, passwords, biometrics, and smart cards Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Usernames and Passwords Username and Password policies:  Change the default username for accounts such as administrator or guest.  Network admin defines a naming convention for usernames.  Three levels of password protection are recommended: •BIOS •Login •Network Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Password Requirements Guidelines for creating strong passwords:  Length - Use at least eight characters.  Complexity - Include letters, numbers, symbols, and punctuation. Use a variety of keys on the keyboard, not just common letters and characters.  Variation - Change passwords often. Set a reminder to change the passwords you have for email, banking, and credit card websites on the average of every three to four months.  Variety - Use a different password for each site or computer that you use. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. File and Folder Permissions  Permission levels are configured to limit individual or group user access to specific data.  NTFS – File system that uses journals which are special areas where file changes are recorded before changes are made. • Can log access by user, date, and time. • Has encryption capability.  FAT 32 - no encryption or journaling  Principle of Least Privilege - only allow users access to the resources they need.  Restricting User Permissions-. If an individual or a group is denied permissions to a network share, this denial overrides any other permissions given. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. Protecting Data The value of physical equipment is often far less than the value of the data it contains. To protect data, there are several methods of security protection that can be implemented.  Software Firewall  Smartcard Security  Biometric Security  Data backups  Data encryption Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. Data Encryption  Encryption - data is transformed using a complicated algorithm to make it unreadable.  Encrypting File System (EFS) is a Windows feature that can encrypt data.  BitLocker can encrypt the entire hard drive volume included in Windows 7 and Windows Vista Ultimate and Enterprise editions.  Trusted Platform Module (TPM) is a specialized chip installed on the motherboard to be used for hardware and software authentication. •TPM stores information specific to the host system, such as encryption keys, digital certificates, and passwords. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. Malware Software Protection Programs  Malware is malicious software that is installed on a computer without the knowledge or permission of the user.  It may take several different anti-malware programs and multiple scans to completely remove all malicious software.  Anti-malware available for these purpose are: Anti-virus, anti-spyware, anti-adware, and phishing programs. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
  • 21. Signature File Updates  New viruses are always being developed, therefore security software must be continually updated. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
  • 22. Common Communication Encryption Types  Hash Encoding uses a mathematical function to create a numeric value that is unique to the data.  Symmetric Encryption requires both sides of an encrypted conversation to use an encryption key to encode and decode the data.  Asymmetric Encryption requires two keys, a private key and a public key. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
  • 23. Service Set Identifiers  The Service Set Identifier (SSID) is the name of the wireless network. A wireless router or access point broadcasts the SSID by default so that wireless devices can detect the wireless network.  To disable SSID broadcasting, use the following path, as shown in the figure:  Wireless > Basic Wireless Settings > select Disabled for SSID Broadcast > Save Settings > Continue  Disabling the SSID broadcast provides very little security. If the SSID broadcast is disabled, each computer user that wants to connect to the wireless network must enter the SSID manually. When a computer is searching for a wireless network, it will broadcast the SSID. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
  • 24. Mac Address Filtering  MAC address filtering is a technique used to deploy device-level security on a wireless LAN. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
  • 25. Wireless Security Modes  Wired Equivalent Privacy (WEP) – The first generation security standard for wireless. Attackers quickly discovered that WEP encryption was easy to break.  Wi-Fi Protected Access (WPA) An improved version of WEP, uses much stronger encryption.  Wi-Fi Protected Access 2 (WPA2) WPA2 supports robust encryption, providing government-grade security. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
  • 26. Wireless Access  Wireless Antennae • Avoid transmitting signals outside of the network area by installing an antenna with a pattern that serves your network users.  Network Device Access • On first connection to the network device, change the default username and password.  Wi-Fi Protected Setup (WPS) • The user connects to the wireless router using the factory-set PIN that is either printed on a sticker or shown on a display. • Software has been developed that can intercept traffic and recover the WPS PIN and the pre-shared encryption key. Disable WPS on the wireless router if possible. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
  • 27. Firewalls Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
  • 28. Port Forwarding and Port Triggering  Port forwarding is a rule-based method of directing traffic between devices on separate networks: •Used when specific ports must be opened so that certain programs and applications can communicate with devices on different networks. •Router determines if the traffic should be forwarded to a certain device based on the port number found with the traffic. For example HTTP – Port 80.  Port triggering allows the router to temporarily forward data through inbound ports to a specific device. •For example, a video game might use ports 27000 to 27100 for connecting with other players. These are the trigger ports. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
  • 29. Physical Equipment Protection Methods  Physical security is as important as data security. Network infrastructure can be protected by: • Secured telecommunications rooms, equipment cabinets, and cages • Cable locks and security screws for hardware devices •Wireless detection for unauthorized access points • Hardware firewalls • Network management system that detects changes in wiring and patch panels  Two- factor Authentication - secured using overlapping protection techniques to prevent unauthorized access to sensitive data. • An example of two-factor authentication is using a password and a smart card to protect an asset. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
  • 30. Security Hardware  There are several methods of physically protecting computer equipment: • Use cable locks with equipment. • Keep telecommunication rooms locked. • Fit equipment with security screws. • Use security cages around equipment. • Label and install sensors, such as Radio Frequency Identification (RFID) tags, on equipment. • Install physical alarms triggered by motion-detection sensors. • Use webcams with motion-detection and surveillance software.  For access to facilities, there are several means of protection: • Card keys that store user data, including level of access • Biometric sensors that identify physical characteristics of the user, such as fingerprints or retinas • Posted security guard • Sensors, such as RFID tags, to monitor equipment Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
  • 31. Service Packs and Security Patches  Regular security updates are essential to combat new viruses or worms.  A technician should understand how and when to install patches and updates.  Patches are code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack  A Service Pack is a combination of patches and updates.  Windows automatically downloads and installs updates by default or can be controlled locally; • Start > All Programs > Windows Update > Change settings Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
  • 32. Data Backup  Windows backups can be done manually or scheduled to takes place automatically.  To start the Windows 7 Backup Files wizard for the first time, use the following path: Start> All Programs > Maintenance >Backup and Restore >Set up backup Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
  • 33. Configuring Firewall Types  A Firewall selectively denies traffic to a computer or network segment.  Restrictive security policy - A firewall that opens only the required ports. Any packet not explicitly permitted is denied.  Configuring the Windows 7 or Windows Vista firewall can be completed in two ways: •Automatically - The user is prompted to Keep Blocking, Unblock, or Ask Me Later for unsolicited requests. •Manage Security Settings – the user adds the program or ports that are required for the applications in use on the network. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
  • 34. Maintaining Accounts  Group employees by job requirements to give access to files by setting up group permissions.  When an employee leaves an organization, access to the network should be terminated immediately.  Guests can be given access through a Guest account.  To configure all of the users and groups on a computer, type lusrmgr.msc in the Search box, or Run Line utility. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
  • 35. Troubleshooting Process Step 1 Identify the problem Step 2 Establish a theory of probable causes Step 3 Test the Theory to Determine cause Step 4 Establish a Plan of Action to Resolve the Problem and Implement the Solution Step 5 Verify Full System Functionality and Implement Preventative Measures Step 6 Document Findings, Actions, and Outcomes Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
  • 36. Step 1 - Identify the Problem  System Information • Manufacturer, model, OS, network environment, connection type  Open-ended questions • When did the problem start? • What problems are you experiencing? • What websites have you visited recently? • What security software is installed in your computer? • Who else has used your computer recently?  Closed-ended questions (Can be answered with a ‘yes’ or ‘no’) • Is your security software up to date? • Have you scanned your computer recently for viruses? • Did you open any attachments from a suspicious e-mail? • Have you changed your password recently? • Have you shared your password? Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
  • 37. Step 2 - Establish a Theory of Probable Cause  Create a list of the most common causes of security problems: •Virus •Trojan Horse •Worm •Spyware •Adware •Grayware or Malware •Phishing scheme •Password compromised •Unprotected equipment rooms •Unsecured work environment Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
  • 38. Step 3 - Test the Theory to Determine cause Test theories of probable cause one at a time, starting with the quickest and easiest. •Disconnect from the network •Update anti-virus and spyware signatures •Scan computer with protection software •Check computer for the latest OS patches and updates •Reboot the computer or network device •Login as a different user to change your password •Secure equipment rooms •Secure work environment •Enforce security policy If the exact cause of the problem has not been determined after all theories have been tested, establish a new theory of probable cause and test it. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
  • 39. Step 4 - Establish a Plan of Action to Resolve the Problem and Implement the Solution • After determining the exact cause of the problem, establish a plan of action to resolve the problem and implement a solution.  Sometimes quick procedures can determine the exact cause of the problem or even correct the problem.  If a quick procedure does not correct the problem, you might need to research the problem further to establish the exact cause. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
  • 40. Step 5 - Verify Full System Functionality and Implement Preventative Measures  Verify full system functionality and implement any preventive measures if needed. •Re-scan computer to ensure no viruses remain. •Re-scan computer to ensure no spyware remains. •Check the security software logs to ensure no problems remain. •Test network and Internet connectivity. •Ensure all application are working. •Verify access to authorized resources such as shared printer and databases.. •Make sure entries are secured. •Ensure security policy is enforced.  Have the customer verify the solution and system functionality. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
  • 41. Step 6 - Document Findings, Actions, and Outcomes  Discuss the solution with the customer  Have the customer confirm that the problem has been solved  Document the process: •Problem description •Solution •Components used •Amount of time spent in solving the problem Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
  • 42. Common Problems and Solutions  See chart in curriculum of Common Security Problems and Solutions Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
  • 43. Chapter 10 Summary  Following proper security procedures will protect computers and network equipment, and the data they contain, from physical danger such as fire and theft, as well as from loss and damage by employees and attackers.  Security threats can come from inside or outside of an organization.  Viruses and worms are common threats that attack data.  Develop and maintain a security plan to protect both data and physical equipment from loss.  Keep operating systems and applications up to date and secure with patches and service packs. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
  • 44. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44

Notas del editor

  1. Cisco Networking Academy program IT Essentials 5.0 Chapter 10: Security
  2. Chapter 10 Objectives
  3. 10.0 Explain why security is important Technicians need to understand computer and network security. Private information, company secrets, financial data, computer equipment, and items of national security are placed at risk if proper security procedures are not followed.
  4. 10.0.1.1 Introduction
  5. 10.1 Security Threats 10.1.1.1 Adware, Spyware and Phishing Malicious software (malware) is any software designed to damage or to disrupt a system: Types of malware are; viruses, worms, Trojan Horses, adware, spyware, grayware, and other unwanted software.
  6. 10.1.1.2 Viruses, Worms, Trojan Horses, and Rootkits
  7. 10.1.1.3 Explain web security Tools that are used to make web pages more powerful and versatile can also make computers more vulnerable to attacks. ActiveX was created by Microsoft to control interactivity on web pages. If ActiveX is on a page, an applet or small program has to be downloaded to gain access to the full functionality. Java is a programming language that allows applets to run within a web browser. Examples of applets include a calculator or a counter. JavaScript is a programming language developed to interact with HTML source code to allow interactive web sites. Examples include a rotating banner or a popup window. Adobe Flash - used to create interactive media (animation, video and games) for the web. Microsoft Silverlight -used to create rich, interactive media for the web, similar to flash. To prevent against these attacks, most browsers have settings that force the computer user to authorize the downloading or use of ActiveX, Java, or JavaScript
  8. 10.1.1.4 InPrivate Browsing
  9. 10.1.1.5 Spam Spam, also known as junk mail, is unsolicited e-mail. In most cases, spam is used as a method of advertising. However, spam can be used to send harmful links or deceptive content. When used as an attack method, spam may include links to an infected website or an attachment that could infect a computer. These links or attachments may result in lots of windows designed to capture your attention and lead you to advertising sites. These windows are called popups. Uncontrolled popup windows can quickly cover the user's screen and prevent any work from getting done. To combat spam and phishing, use anti-virus software and setting options in e-mail. Some spam still may get through, so look for these common indications of spam; no subject line, incomplete return address, computer generated e-mails, and return e-mails not sent by the user.
  10. 10.1.1.6 Explain TCP/IP Attacks TCP/IP is the protocol suite used to control all communications on the Internet. The most common TCP/IP attacks are: Denial of Service (DoS) is a form of attack that prevents users from accessing normal services, such as e-mail or a web server, because the system is busy responding to abnormally large amounts of requests. DoS works by sending enough requests for a system resource that the requested service is overloaded and ceases to operate. Distributed DoS (DDoS) uses many infected computers, called zombies or botnets, to launch an attack. With DDoS, the intent is to obstruct or overwhelm access to the targeted server. Zombie computers located at different geographical locations make it difficult to trace the origin of the attack. SYN Flood randomly opens TCP ports, tying up the network equipment or computer with a large amount of false requests, causing sessions to be denied to others Spoofing - uses a forged IP or MAC address to impersonate a trusted computer. Man-in-the-Middle - intercepting communications between computers to steal information transiting through the network. Replay - data transmissions are intercepted and recorded by an attacker, then replayed to gain access. DNS Poisoning - changing DNS records to point to imposter servers. 10.1.1.7 Worksheet – Security Attacks
  11. 10.1.2.1 Social Engineering Social engineering occurs when an attacker tries to gain access to equipment or a network by tricking people into providing the necessary access information. Often, the social engineer gains the confidence of an employee and convinces the employee to divulge username and password information. To protect against social engineering: Never give out your password. Always ask for the ID of unknown persons. Restrict access to visitors. Escort all visitors. Never post your password in your work area. Lock your computer when you leave your desk. Do not let anyone follow you through a door that requires an access card. How many people know someone who writes a password on a note and sticks it to the monitor or under the keyboard?
  12. 10.1.2.2 Data Wiping, Hard Drive Destruction and Recycling Methods are commonly used to either destroy or recycle data and hard drives: Data wiping Degaussing Hard drive destruction Hard drive recycling
  13. 10.2 Security Procedures 10.2.1.1 What is a Security Policy? A security policy includes the following elements: An acceptable computer usage statement for the organization. The people permitted to use the computer equipment. Devices that are permitted to be installed on a network, as well as the conditions of the installation. Modems and wireless access points are examples of hardware that could expose the network to attacks. Requirements necessary for data to remain confidential on a network. Process for employees to acquire access to equipment and data. This process may require the employee to sign an agreement regarding company rules. It also lists the consequences for failure to comply. 10.2.1.2 Worksheet – Answer Security Policy Questions Teaching Strategy: Security policies describe what to do when faced with many emergencies. It is important to develop and distribute the security policy BEFORE the emergency happens. Local security policies may vary from company to company. They may also vary depending on the device to secure.
  14. 10.2.1.3 Security Policy Requirements The security policy should also provide detailed information about the following issues in case of an emergency: Steps to take after a breach in security Who to contact in an emergency Information to share with customers, vendors, and the media Secondary locations to use in an evacuation Steps to take after an emergency is over, including the priority of services to be restored
  15. 10.2.1.4 Usernames and Passwords
  16. 10.2.1.5 Password Requirements
  17. 10.2.1.6 File and Folder Permissions 10.2.1.7 Lab – Securing Accounts, Data, and the Computer in Windows 7 10.2.1.8 Lab – Securing Accounts, Data, and the Computer in Windows Vista 10.2.1.9 Lab – Securing Accounts, Data, and the Computer in Windows XP
  18. 10.2.2.1 Software Firewall Every communication using TCP/IP is associated with a port number. HTTPS, for instance, uses port 443 by default. A firewall is a way of protecting a computer from intrusion through the ports. The user can control the type of data sent to a computer by selecting which ports will be open and which will be secured. 10.2.2.2 Biometric and Smart Cards Biometric Security compares physical characteristics against stored profiles to authenticate people. A profile is a data file containing known characteristics of an individual such as a fingerprint or a handprint. Common biometric devices available include fingerprint readers, handprint readers, iris scanners, and face recognition devices. Smart cards store private information such as bank account numbers, personal identification, medical records, and digital signatures. Smart cards provide authentication and encryption to keep data safe. 10.2.2.3 Data backups Data backups are one of the most effective ways of protecting against data loss. Establish data backup procedures which account for frequency of backups, storage for data backups, and securing data backups using passwords.
  19. 10.2.2.4 Data Encryption
  20. 10.2.3.1 Malware Software Protection Programs 10.2.3.2 Worksheet – Third-Party Antivirus Software
  21. 10.2.3.3 Signature File Updates
  22. 10.2.4.1 Common Communication Encryption Types
  23. 10.2.4.2 Service Set Identifiers
  24. 10.2.4.3 Mac Address Filtering
  25. 10.2.4.4 Wireless Security Modes 10.2.4.5 Packet Tracer – Wireless Security Techniques
  26. 10.2.4.6 Wireless Access
  27. 10.2.4.7 Firewalls A hardware firewall passes two different types of traffic into your network: Responses to traffic that originates from inside your network Traffic destined for a port that you have intentionally left open There are several types of hardware firewall configurations: Packet filter - Packets cannot pass through the firewall, unless they match the established rule set configured in the firewall. Traffic can be filtered based on different attributes, such as source IP address, source port or destination IP address or port. Traffic can also be filtered based on destination services or protocols such as WWW or FTP. Stateful packet inspection - This is a firewall that keeps track of the state of network connections traveling through the firewall. Packets that are not part of a known connection are dropped. Application layer - All packets traveling to or from an application are intercepted. All unwanted outside traffic is prevented from reaching protected devices. Proxy - This is a firewall installed on a proxy server that inspects all traffic and allows or denies packets based on configured rules. A proxy server is a server that is a relay between a client and a destination server on the Internet. Demilitarized Zone A DMZ is a subnetwork that provides services to an untrusted network. An email, web, or FTP server is often placed into the DMZ so that the traffic using the server does not come inside the local network. This protects the internal network from attacks by this traffic, but does not protect the servers in the DMZ in any way. 10.2.4.8 Worksheet – Research Firewalls
  28. 10.2.4.9 Port Forwarding and Port Triggering 10.2.4.10 Lab – Configure Wireless Security
  29. 10.2.5.1 Physical Equipment Protection Methods: When a computer is stolen, the data is also stolen. There are several methods of physically protecting computer and network equipment: Secured telecommunications rooms, equipment cabinets, and cages Cable locks and security screws for hardware devices Wireless detection for unauthorized access points Hardware firewalls Network management system that detects changes in wiring and patch panels Disabling AutoRun By disabling the AutoRun feature on Windows XP, a user can minimize the security risk from a malicious program running automatically when new media is connected to the computer. Two-factor Authentication Computer equipment and data can be secured using overlapping protection techniques to prevent unauthorized access to sensitive data. An example of overlapping protection is using a password and a smart card to protect an asset. Teaching Strategy: Since stealing the whole PC is the easiest way to steal data; physical computer equipment must be secured.
  30. 10.2.5.2 Security Hardware 10.2.5.3 Physical Security Activity
  31. 10.3 Common Preventive Maintenance Techniques for Security 10.3.1.1 Operating System Service Packs and Security Patches 10.3.1.2 Worksheet – Operating System Updates in Windows Teaching Strategy: Attackers methods are constantly changing. As new exploits are discovered, manufacturers create patches and new procedures. The technician must be able to install these and the user should know how to recognize when updates are needed.
  32. 10.3.1.3 Data Backup 10.3.1.4 Lab – Data Backup and Recovery in Windows 7 10.3.1.5 Lab – Data Backup and Recovery in Windows Vista 10.3.1.6 Lab – Data Backup and Recovery in Windows XP
  33. 10.3.1.7 Configuring Firewall Types 10.3.1.8 Lab – Configure a Windows 7 Firewall 10.3.1.9 Lab – Configure a Windows Vista Firewall 10.3.1.10 Lab – Configure a Windows XP Firewall
  34. 10.3.1.11 Maintaining Accounts
  35. 10.4 Applying the Troubleshooting Process to Security
  36. 10.4.1 Applying the Troubleshooting Process to Security 10.4.1.1 Identify the Problem
  37. 10.4.1 Applying the Troubleshooting Process to Security 10.4.1.2 Establish a Theory of Probable Cause
  38. 10.4.1 Applying the Troubleshooting Process to Security 10.4.1.3 Determine the exact cause
  39. 10.4.1 Applying the Troubleshooting Process to Security 10.4.1.4 Establish a Plan of Action to Resolve the Problem and Implement a Solution If a quick procedure does correct the problem, you can go to step 5 to verify the solution and full system functionality. Evaluate the problem and research possible solutions. Divide larger problems into smaller problems that can be analyzed and solved individually. Prioritize solutions starting with the easiest and fastest to implement. Check: Helpdesk repair logs Other techs Manufacturer FAQs Technical websites News groups Computer manuals Device manuals Online forums Internet search
  40. 10.4.1 Applying the Troubleshooting Process to Security 10.4.1.5 Verify Solution and System Functionality NOTE: Never ask a customer to reveal a password. If you need to access a computer and the customer cannot stay nearby, have the customer create a temporary password. Advise the customer to reset the password when the repair is complete.
  41. 10.4.1 Applying the Troubleshooting Process to Security 10.4.1.6 Document Findings
  42. 10.4.2.1 Identify common problems and solutions [Direct the students to the curriculum to see all the charts explaining more common problems and solutions] 10.4.2.2 Worksheet – Gather Information from the Customer Computer problems can be attributed to hardware, software, connectivity issues, or some combination of the three. You will resolve some types of computer problems more often than others. The worksheet is designed to reinforce your communication skills to verify information from the customer.
  43. Chapter 10 Summary