Top Banner
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0
37
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ITE PC v40 Chapter9

© 2007 Cisco Systems, Inc. All rights reserved. Cisco PublicITE PC v4.0 Chapter 9 1

Chapter 9: Security

IT Essentials: PC Hardware and Software v4.0

Page 2: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Purpose of this Presentation

List of chapter objectives

Overview of the chapter contents, including student worksheets

student activities

some potential student misconceptions

Reflection/Activities for instructors to complete to prepare to teach

Additional resources

To provide to instructors an overview of Chapter 9:

Page 3: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Chapter 9 Objectives 9.1 Explain why security is important

9.2 Describe security threats

9.3 Identify security procedures

9.4 Identify common preventive maintenance techniques for security

9.5 Troubleshoot security

Page 4: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Chapter 9 Worksheets and Activity 9.1 Worksheet: Security Attacks

9.2.1 Worksheet: Third-Party Anti-Virus Software

9.2.3 Activity: Adware, Spyware, and Grayware

9.4.2 Worksheet: Operating System Updates

9.5.6 Worksheet: Gather Information from the Customer

Page 5: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

The Importance of Security

Private information, company secrets, financial data, computer equipment, and items of national security are placed at risk if proper security procedures are not followed.

A technician’s primary responsibilities include data and network security.

Page 6: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security ThreatsTypes of attacks to computer security:

PhysicalTheft, damage, or destruction to computer equipment.

DataRemoval, corruption, denial of access, unauthorized access, or theft of information.

Potential threats to computer security:

Internal threatsEmployees can cause a malicious threat or an accidental threat.

External threatsOutside users can attack in an unstructured or structured way.

Page 7: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Viruses, Worms, and Trojan Horses A computer virus is software code that is deliberately

created by an attacker. Viruses may collect sensitive information or may alter or destroy information.

A worm is a self-replicating program that uses the network to duplicate its code to the hosts on the network. At a minimum, worms consume bandwidth in a network.

A Trojan horse is technically a worm and is named for its method of getting past computer defenses by pretending to be something useful.

Anti-virus software is designed to detect, disable, and remove viruses, worms, and Trojan horses before they infect a computer.

Page 8: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Web SecurityAttackers may use any of these tools to install a program on a computer.

ActiveXControls interactivity on web pages

JavaAllows applets to run within a browser

Example: a calculator or a counter

JavaScriptInteracts with HTML source code to allow interactive web sites

Example: a rotating banner or a popup window

Page 9: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Adware, Spyware, and Grayware Typically installed without the user’s knowledge, these

programs collect information stored on the computer, change the computer configuration, or open extra windows on the computer and all without the user’s consent.

Page 10: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Denial of Service (DoS) Prevents users from accessing normal services

Sends enough requests to overload a resource or even stopping its operation

Ping of Death is a series of repeated, larger than normal pings intended to crash the receiving computer

E-mail Bomb is a large quantity of bulk e-mail that overwhelms the e-mail server preventing users from accessing e-mail

Distributed DoS is an attack launched from many computers, called zombies

Page 11: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Spam and Popup Windows

Use anti-virus software, options in e-mail software, popup blockers, and common indications of spam to combat these.

Spam is unsolicited email that can be used to send harmful links or deceptive content.

Popups are windows that automatically open and are designed to capture your attention and lead you to advertising sites.

Page 12: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Social Engineering

Never give out a password

Always ask for the ID of the unknown person

Restrict access of unexpected visitors

Escort all visitors through the facility

Page 13: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

TCP/IP AttacksTCP/IP is used to control all Internet communications.

Page 14: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Computer Disposal and Recycling Erase all hard drives, then use a third-party tool to fully

erase all data.

The only way to fully ensure that data cannot be recovered from a hard drive is to carefully shatter the platters with a hammer and safely dispose of the pieces.

To destroy software media (floppy disks and CDs), use a shredding machine designed for shredding these materials.

Page 15: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security is Strengthened in Layers

Page 16: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Security PolicyQuestions to answer in writing a local security policy:

What assets require protection?

What are the possible threats?

What should be done in the event of a security breach?

Page 17: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Protecting EquipmentSince stealing the whole PC is the easiest way to steal data, physical computer equipment must be secured.

Control access to facilities

Use cable locks

Lock telecommunication rooms

Use security screws

Use security cages around equipment

Label and install sensors on equipment

Page 18: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Protecting DataMethods of securing data:

Password protection

Data encryption

Port protection

Data backups

File system security

Page 19: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Levels of Wireless Security

Page 20: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Installing Updates and Patches

A technician recognizes when new updates and patches are available and knows how to install them.

Page 21: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Updating Protection ProgramsLaunch

protection program

Run a scan

Click update button

Manually treat or delete

Schedule future automatic

updates and scans

Need to manually treat

or delete?

Review scan report

Create a restore point

Yes

No

Page 22: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Operating System Updates and Patches

Check for updates

Install update

Download updates

Restart computer

Test all aspects to ensure the update has

not caused issues

Prompted to

restart?

Create a restore point

Yes

No

Page 23: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Step 1 Gather data from the customer

Step 2 Verify the obvious issues

Step 3 Try quick solutions first

Step 4 Gather data from the computer

Step 5 Evaluate the problem and implement the solution

Step 6 Close with the customer

Troubleshooting Process

Page 24: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

1. Gather Data from the Customer

Customer informationCompany name, contact name, address, phone number

Computer configurationProtection software, OS, network environment, connection type

Description of problemOpen-ended questions

What changes were made to the security settings?

Closed-ended questions

Are the protection software signature files up-to-date?

Page 25: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

2. Verify the Obvious IssuesExamine the most obvious causes of a problem.

A visual inspection can resolve some issues.Broken locks, signs of tampering, missing equipment

Has an attacker accessed the equipment?Unfamiliar login address in login windows, unexplained entries in system security logs, missing or additional patch cords

Wireless network issuesChanges in access point configuration, unexplained connections in the access point status display

Page 26: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

3. Try Quick Solutions First Check that all cables are connected to the proper locations

Unseat and then reconnect cables and connectors

Reboot the computer or network device

Login as a different user

Check that the anti-virus and spyware signature files are up-to-date

Scan computer with protection software

Check computer for the latest OS patches and updates

Disconnect from the network

Change your password

Page 27: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

4. Gather Data from the Computer Third-party software, such as anti-virus and anti-

spyware applications, can report on the files that have been infected.

There are several tools available in the operating system that a technician can use:

Verify that the signature file is current.

Check the security software log file for entries.

Task Manager is used to check for unknown applications that are running.

Page 28: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 28© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

5. Evaluate Problem & Implement Solution

1. Evaluate the information gathered from the customer and from the laptop

2. Determine possible solutions

3. Implement the best solution

4. If a proposed solution doesn’t correct the problem, reset the computer back to the original state and try another proposed solution.

NOTE: Never ask a customer to reveal a password.

Page 29: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 29© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

6. Close with the Customer Discuss with customer the solution implemented.

Have customer verify problem is solved.

Provide all paperwork to customer.

Document steps of solution in work order and in technician’s journal.

Document components used in repair.

Document time spent to resolve the problem.

Page 30: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 30© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Common Problems and SolutionsProblem Symptom Possible Solution

A computer runs updates and requires rebooting at inconvenient times.

Set Windows Automatic Update to run daily at a convenient time, such as lunchtime.

A wireless network is compromised even though 64-bit WEP encryption is in use.

Upgrade to 128-bit WEP security, WAP, or EAP-Cisco security.

A stolen laptop is returned by the police. It is no longer needed by the user.

After recovering any sensitive data, destroy the hard drive and recycle the computer.

A user complains that his system is receiving hundreds or thousands of junk e-mails daily.

This may be a denial of service attack. At the e-mail server, filter out e-mail from the sender.

A printer repair person no one remembers seeing before is observed looking under keyboards and on desktops.

Contact security or police. Advise users never to hide passwords near their work area.

Page 31: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 31© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Chapter 9 SummaryFollowing proper security procedures will protect computers

and network equipment, and the data they contain, from physical danger such as fire and theft, as well as from loss and damage by employees and attackers.

Security threats can come from inside or outside of an organization.

Viruses and worms are common threats that attack data.

Develop and maintain a security plan to protect both data and physical equipment from loss.

Keep operating systems and applications up to date and secure with patches and service packs.

Page 32: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 32© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Instructor Training Activities

Page 33: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 33© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Activities for Instructor Training1. Take the Quiz provided in Chapter 9 course content.

2. Conduct Internet research to pre-screen online resources for students to use in completing the following student worksheets:

9.1 Worksheet: Security Attacks

9.2.1 Worksheet: Third-Party Anti-Virus Software

9.4.2 Worksheet: Operating System Updates

3. Brainstorm a list of at least 4 additional troubleshooting scenarios to provide students more opportunities to practice this skill. For an example, refer to the student worksheet, 9.5.2 Gather

Information from the Customer.

Page 34: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 34© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Instructor Training Discussion Share with the other instructors the list of online

resources found that students might use in completing the research activity worksheets.

Share with the other instructors the list of additional troubleshooting scenarios.

Participate in a role-playing activity of one of the troubleshooting scenarios.

Following the role-playing activity, discuss the different ways you might incorporate role-playing activities into your classroom. Share ideas of how to make the student successful in these activities.

Page 35: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 35© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Additional Resources Whatis?com: IT Encyclopedia and Learning Center

http://whatis.com

TechTarget: The Most Targeted IT Media http://techtarget.com

ZDNet: Tech News, Blogs and White Papers for IT Professionals http://www.zdnet.com

HowStuffWorks: It's Good to Know http://computer.howstuffworks.com

CNET.com http://www.cnet.com

PC World http://www.pcworld.com

ComputerWorld http://www.computerworld.com

WIRED NEWS http://www.wired.com

eWEEK.com http://www.eweek.com

Page 36: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 36© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Q and A

Page 37: ITE PC v40 Chapter9

ITE PC v4.0 Chapter 9 37© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public