230 likes | 380 Views
Basic Security. Networking for Home and Small Businesses – Chapter 8. Objectives. Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications.
E N D
Basic Security Networking for Home and Small Businesses – Chapter 8
Objectives • Identify and describe the various networking threats. • Identify different methods of attack. • Describe security procedures and applications. • Describe the features of a firewall and how it can be used to protect against an attack.
Networking Threats • Describe major risks of network intrusion
Networking Threats • Define the sources of network intrusion.
Networking Threats • Describe social engineering and phishing
Methods of Attack • Describe viruses, worms, and Trojan horses.
Methods of Attack • Denial of Service and Brute Force attacks
Methods of Attack • Describe spyware, tracking cookies, adware and pop-ups.
Methods of Attack • Describe Spam
Security Procedures and Applications • Defining a security policy
Security Procedures and Applications • Define common security procedures
Security Procedures and Applications • Describe how updates and patches relate to security issues.
Security Procedures and Applications • Anti-virus software
Security Procedures and Applications • SPAMprevention
Security Procedures and Applications • Anti-Spyware
Firewall Features and How to Use them to Protect Against an Attack • What is a firewall?
Firewall Features and How to Use them to Protect Against an Attack • Using a Firewall to Protect Against an Attack
Firewall Features and How to Use them to Protect Against an Attack • Vulnerability Analysis
Firewall Features and How to Use them to Protect Against an Attack • Security Best Practices
Summary • Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals. • Effective network security is based on a variety of products and services, combined with a thorough security policy. • A firewall controls traffic between networks and helps prevent unauthorized access.