1 / 21

IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 16: Advanced Security

IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 16: Advanced Security. Chapter 16: Objectives. Outline security requirements based on customer needs. Select security components based on customer needs. Implement the customer's security plan.

cbynum
Download Presentation

IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 16: Advanced Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT Essentials PC Hardware and Software 4.1Instructional ResourceChapter 16: Advanced Security

  2. Chapter 16: Objectives Outline security requirements based on customer needs. Select security components based on customer needs. Implement the customer's security plan. Perform preventive maintenance on security. Troubleshoot security.

  3. Chapter 16: Critical Concepts • What is this chapter about and why is it important? • A school once asked an advisory committee whether they should have a mandatory security course in their program. The response was not only that a mandatory course should be included, but that every computer course should contain a security section, and every computer course topic should include the topic of security. • Computer security cannot be touched upon lightly. It is a moral and ethical obligation of any computer technician to ensure that a computer is configured for security and that the user is informed of security best practices. This chapter describes security policies, the security requirements and components that match customer needs, preventive measures that increase security, and ways to configure and troubleshoot security-related issues.

  4. Chapter 16: Activities What activities are associated with this chapter? 16.1.1 Worksheet: Answer Security Policy Questions 16.2.3 Worksheet: Research Firewalls 16.3.1 Lab: Configure Wireless Security 16.3.2 Lab: Configure Windows XP Firewall 16.3.2 Optional Lab: Configure Windows Vista Firewall 16.4.3 Lab: Data Backup and Recovery in Windows XP 16.4.3 Optional Lab: Data Backup and Recovery in Windows Vista 16.5.3 Lab: Fix a Security Problem 16.5.3 Lab: Remote Technician: Fix a Security Problem 16.5.3 Lab: Troubleshooting Access Security with Windows XP 16.5.3 Optional Lab: Troubleshooting Access Security with Windows Vista Chapter 16 Quiz

  5. Chapter 16: New Terms What terms are introduced in this chapter?

  6. Chapter 16: New Terms What terms are introduced in this chapter?

  7. Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.1.1 Outline a local security policy Security policy elements Page 16.1.2 Explain when and how to use security hardware End user instruction Page 16.1.3 Explain when and how to use security application software End user instruction Intrusion detection systems

  8. Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.3.1 Configure security settings Wireless WEP WPA MAC filtering Routers/access points MAC filtering Changing default username and password Firewalls

  9. Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.3.1 Configure security settings (continued) Basics of hardware and software firewall configuration Port assignment/setting up rules Port forwarding/port triggering Operating systems Local users and groups Vista User Account Control NTFS permissions vs. share permission Allow vs. deny Differentiate between moving and copying files and folders File attributes File and folder sharing

  10. Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.3.2 Describe configuring firewall types Basics of hardware and software firewall configuration Port assignment Setting up rules Page 16.4.3 Explain data backup procedures, access to backups, and secure physical backup media Ntbackup utility

  11. Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.5.1 Review the troubleshooting process Identify the Problem Establish a Theory of Probable Causes Determine an Exact Cause Implement a Solution Verify Solution and Full System Functionality Document Findings

  12. Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.5.2 Identify common problems and solutions Using antivirus software Identification of malware symptoms Quarantine of infected systems Researching malware types, symptoms, and solutions Remediation of infected systems Updating antivirus software and instruct the end user Signature engine updates Automatic vs. manual updates Configuring proxy settings Ports IP addresses Exceptions Programs

  13. Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.5.2 Identify common problems and solutions (continued) Configuring firewall settings Open and closed ports Program filters Scheduling scans Repairing boot blocks Scan and removal techniques Safe mode Boot environment End user instruction

  14. Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.5.2 Identify common problems and solutions (continued) Configuring operating system Vista User Account Control Shared files and folders Administrative shares vs. local shares Permission propagation Inheritance Data Encryption User authentication Securing the system BIOS security Drive lock Passwords TPM

  15. Chapter 16: Classroom Management • Have some students configure wireless NICs and others configure the access point. Reverse roles with different security settings. If time is an issue, bring an access point into the class that is already configured for three different SSIDs. Each SSID has a different security configuration. Students can configure a wireless NIC for each of the SSIDs and show connectivity. • Discuss physical security; it is a commonly forgotten topic. It can also be discussed when the security policy is explained. • Allow practice time for the class to role-play how they would educate a user on specific security-related issues such as viruses, malware, and phishing.

  16. Chapter 16: Teaching Analogies • Having a wireless or wired network without security is like leaving your front door unlocked and hoping that no intruder will enter the house. There are software applications that are like a thief who tries your door handle every day. If you do not have good security, eventually the thief will gain access to your computer or home.

  17. Chapter 16: Suggested Class Discussions • What are the different methods of encryption? How and when should these encryption methods be used? • What are the different methods of authentication? How and when should these authentication methods be used? • What are the various file and folder permissions and how should they be used? • What is Windows Defender and why is it used? • What is port scanning and why is it used? • What is war driving and how can you defend against it? • What are some different types of security policies? Why is it important to have and follow a security policy?

  18. Chapter 16: Best Practices • An employee that has been released from a company has a laptop protected with a fingerprint scanner. Research different vendor methods for recovering access to this laptop that is protected by a fingerprint scanner. • Have the students research different Windows security policies. • Give the students the following scenarios and have them create the appropriate security policy: • Users in a small company get a lot of e-mail attachments. Create a policy that allows only certain file types to be contained in an e-mail attachment folder. • Set up a software policy that will only affect those users that share a computer, such as part-time staff.

  19. Chapter 16: Outside Reading National Security Agency http://www.nsa.gov/ Verisign http://www.verisign.com/

More Related