8/14/2019 Discovery Home SB Chapter 8
1/21
2007 Cisco Systems, Inc. All rights reserved. Cisco PublicITE PC v4.0Chapter 1 1
Basic Security
Networking for Home and Small Businesses Chapter8
8/14/2019 Discovery Home SB Chapter 8
2/21
ITE PC v4.0Chapter 1 2 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Objectives Identify and describe the various networking threats.
Identify different methods of attack.
Describe security procedures and applications.
Describe the features of a firewall and how it can beused to protect against an attack.
8/14/2019 Discovery Home SB Chapter 8
3/21
ITE PC v4.0Chapter 1 3 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Networking Threats Describe major risks of network intrusion
8/14/2019 Discovery Home SB Chapter 8
4/21
ITE PC v4.0Chapter 1 4 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Networking Threats Define the sources of network intrusion.
8/14/2019 Discovery Home SB Chapter 8
5/21
ITE PC v4.0Chapter 1 5 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Networking Threats Describe social engineering and phishing
8/14/2019 Discovery Home SB Chapter 8
6/21
ITE PC v4.0Chapter 1 6 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Methods of Attack Describe viruses, worms, and Trojan horses.
8/14/2019 Discovery Home SB Chapter 8
7/21ITE PC v4.0Chapter 1 7 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Methods of Attack Denial of Service and Brute Force attacks
8/14/2019 Discovery Home SB Chapter 8
8/21ITE PC v4.0Chapter 1 8 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Methods of Attack Describe spyware, tracking cookies, adware and pop-
ups.
8/14/2019 Discovery Home SB Chapter 8
9/21ITE PC v4.0Chapter 1 9 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Methods of Attack Describe Spam
8/14/2019 Discovery Home SB Chapter 8
10/21ITE PC v4.0Chapter 1 10 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications Defining a security policy
8/14/2019 Discovery Home SB Chapter 8
11/21ITE PC v4.0Chapter 1 11 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications Define common security procedures
8/14/2019 Discovery Home SB Chapter 8
12/21ITE PC v4.0Chapter 1 12 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications
Describe how updates and patches relate to securityissues.
8/14/2019 Discovery Home SB Chapter 8
13/21
ITE PC v4.0Chapter 1 13 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications
Anti-virus software
8/14/2019 Discovery Home SB Chapter 8
14/21
ITE PC v4.0Chapter 1 14 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications
SPAMprevention
8/14/2019 Discovery Home SB Chapter 8
15/21
ITE PC v4.0Chapter 1 15 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Security Procedures and Applications
Anti-Spyware
8/14/2019 Discovery Home SB Chapter 8
16/21
ITE PC v4.0Chapter 1 16 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Firewall Features and How to Use them toProtect Against an Attack
What is a firewall?
8/14/2019 Discovery Home SB Chapter 8
17/21
ITE PC v4.0Chapter 1 17 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Firewall Features and How to Use them toProtect Against an Attack
Using a Firewall to Protect Against an Attack
8/14/2019 Discovery Home SB Chapter 8
18/21
ITE PC v4.0Chapter 1 18 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Firewall Features and How to Use them toProtect Against an Attack
Vulnerability Analysis
8/14/2019 Discovery Home SB Chapter 8
19/21
ITE PC v4.0Chapter 1 19 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Firewall Features and How to Use them toProtect Against an Attack
Security Best Practices
8/14/2019 Discovery Home SB Chapter 8
20/21
ITE PC v4.0Chapter 1 20 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Summary Networks can be open to intrusion through
vulnerabilities in software, hardware attacks, or theweaknesses of individuals.
Effective network security is based on a variety of
products and services, combined with a thoroughsecurity policy.
A firewall controls traffic between networks and helpsprevent unauthorized access.
8/14/2019 Discovery Home SB Chapter 8
21/21
ITE PC v4 0