discovery home s b chapter 8
TRANSCRIPT
![Page 1: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/1.jpg)
© 2007 Cisco Systems, Inc. All rights reserved. Cisco PublicITE PC v4.0Chapter 1 1
Basic Security
Networking for Home and Small Businesses – Chapter 8
![Page 2: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/2.jpg)
ITE PC v4.0Chapter 1 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Objectives Identify and describe the various networking threats.
Identify different methods of attack.
Describe security procedures and applications.
Describe the features of a firewall and how it can be used to protect against an attack.
![Page 3: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/3.jpg)
ITE PC v4.0Chapter 1 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Networking Threats Describe major risks of network intrusion
![Page 4: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/4.jpg)
ITE PC v4.0Chapter 1 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Networking Threats Define the sources of network intrusion.
![Page 5: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/5.jpg)
ITE PC v4.0Chapter 1 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Networking Threats Describe social engineering and phishing
![Page 6: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/6.jpg)
ITE PC v4.0Chapter 1 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Methods of Attack Describe viruses, worms, and Trojan horses.
![Page 7: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/7.jpg)
ITE PC v4.0Chapter 1 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Methods of Attack Denial of Service and Brute Force attacks
![Page 8: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/8.jpg)
ITE PC v4.0Chapter 1 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Methods of Attack Describe spyware, tracking cookies, adware and pop-
ups.
![Page 9: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/9.jpg)
ITE PC v4.0Chapter 1 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Methods of Attack Describe Spam
![Page 10: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/10.jpg)
ITE PC v4.0Chapter 1 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications Defining a security policy
![Page 11: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/11.jpg)
ITE PC v4.0Chapter 1 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications Define common security procedures
![Page 12: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/12.jpg)
ITE PC v4.0Chapter 1 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications Describe how updates and patches relate to security
issues.
![Page 13: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/13.jpg)
ITE PC v4.0Chapter 1 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications Anti-virus software
![Page 14: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/14.jpg)
ITE PC v4.0Chapter 1 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications SPAM prevention
![Page 15: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/15.jpg)
ITE PC v4.0Chapter 1 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications Anti-Spyware
![Page 16: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/16.jpg)
ITE PC v4.0Chapter 1 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Firewall Features and How to Use them to Protect Against an Attack What is a firewall?
![Page 17: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/17.jpg)
ITE PC v4.0Chapter 1 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Firewall Features and How to Use them to Protect Against an Attack Using a Firewall to Protect Against an Attack
![Page 18: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/18.jpg)
ITE PC v4.0Chapter 1 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Firewall Features and How to Use them to Protect Against an Attack Vulnerability Analysis
![Page 19: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/19.jpg)
ITE PC v4.0Chapter 1 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Firewall Features and How to Use them to Protect Against an Attack Security Best Practices
![Page 20: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/20.jpg)
ITE PC v4.0Chapter 1 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Summary Networks can be open to intrusion through
vulnerabilities in software, hardware attacks, or the weaknesses of individuals.
Effective network security is based on a variety of products and services, combined with a thorough security policy.
A firewall controls traffic between networks and helps prevent unauthorized access.
![Page 21: Discovery Home S B Chapter 8](https://reader035.vdocuments.mx/reader035/viewer/2022062513/557621a7d8b42a4e1c8b4d04/html5/thumbnails/21.jpg)
ITE PC v4.0Chapter 1 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public