ccna dis1 - chapter 8 - basic security [compatibility mode]

Upload: httpheiserzcom

Post on 06-Apr-2018

258 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    1/22

    Chapter 8 Basic Security

    CCNA Discovery 4.0

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    2/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Objectives

    Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications. Describe the features of a firewall and how it can be used

    to protect against an attack.

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    3/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Networking Threats

    Risk of Network Intrusion

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    4/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Networking Threats

    Sources of Network Intrusion

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    5/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Networking Threats

    Social Engineering and Phishing

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    6/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Networking Threats

    Social Engineering and Phishing

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    7/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Methods of Attack

    Viruses, Worms and Trojan HorsesViruses Worm Trojan Horses

    A virus is aprogram that runsand spreads by

    modifying otherprograms or files

    A virus cannotstart by itself; itneeds to beactivated

    Viruses can betransmitted viaemail attachments,downloaded files,instant messagesor via diskette, CDor USB devices

    Worm does notneed to attach itselfto an existing

    programA worm uses thenetwork to sendcopies of itself toany connectedhosts

    Worms can runindependently andspread quickly

    A Trojan horse isa non-selfreplicating program

    that is written toappear like alegitimate program,when in fact it is anattack tool

    Trojans can also

    create a back doorinto a systemallowing hackers togain access

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    8/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Methods of Attack

    Denial of Service and Brute Force Attacks

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    9/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Methods of Attack

    Spyware, Tracking Cookies, Adware and Pop-upsSpyware Tracking Cookies Adware Pop-ups

    Spyware is anyprogram thatgathers personalinformation from

    your computerwithout yourpermission orknowledge

    Spyware is usuallyinstalled

    unknowingly whendownloading a file,installing anotherprogram or clickinga popup

    Difficult to remove

    Cookies are aform of spyware butare not always bad

    They are used to

    record informationabout an Internetuser when they visitwebsites

    Many web sitesrequire that cookies

    be enabled in orderto allow the user toconnect.

    Adware is a formof spyware used tocollect informationabout a user based

    on websites the uservisits

    Adware iscommonly installedby a user inexchange for a

    "free" productAdware can bevery difficult touninstall

    Pop-ups and pop-unders areadditionaladvertising windows

    that display whenvisiting a web site

    pop-ups and pop-unders are notintended to collectinformation about

    the userPop-ups: open infront of the currentbrowser window.

    Pop-unders: openbehind the currentbrowser window.

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    10/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Methods of Attack

    Spam

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    11/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Security Policy

    Common Security Measures

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    12/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Security Policy

    Common Security MeasuresDescribe common security procedures

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    13/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Security Policy

    Updates and PatchesDescribe how updates and patches relate to security issues.

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    14/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Security Policy

    Anti-virus software features: Email checking - Scans incoming andoutgoing emails, and identifies suspicious

    attachments.

    Resident dynamic scanning - Checks

    executable files and documents whenthey are accessed.

    Scheduled scans - Virus scans can bescheduled to run at regular intervals

    and check specific drives or the entire

    computer.

    Automatic Updates - Checks for, anddownloads, known virus characteristics

    and patterns. Can be scheduled to check

    or updates on a regular basis.

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    15/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Security Policy

    Anti Spam

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    16/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Security Policy

    Anti-Spyware

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    17/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Using Firewalls

    What is Firewall Appliance-based firewalls - An appliance-based firewall is a firewall that is built-in

    to a dedicated hardware device known as

    a security appliance

    Server-based firewalls - A server-basedfirewall consists of a firewall applicationthat runs on a network operating system

    (NOS) such as UNIX, Windows or Novell

    Integrated Firewalls - An integratedfirewall is implemented by adding

    firewall functionality to an existing device,

    such as a router

    Personal firewalls - Personal firewallsreside on host computers and are not

    designed for LAN implementations

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    18/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Using Firewalls

    Using a Firewall to Protect Against an Attack

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    19/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Using Firewalls

    Vulnerability Analysis

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    20/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Using Firewalls

    Best Practices

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    21/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    Summary

    Networks can be open to intrusion through vulnerabilities insoftware, hardware attacks, or the weaknesses ofindividuals.

    Effective network security is based on a variety of productsand services, combined with a thorough security policy.

    A firewall controls traffic between networks and helpsprevent unauthorized access.

    PDF created with pdfFactory trial version www.pdffactory.com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/
  • 8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]

    22/22

    Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

    PDF created with pdfFactory trial version www pdffactory com

    http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/