ccna dis1 - chapter 8 - basic security [compatibility mode]
TRANSCRIPT
-
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
1/22
Chapter 8 Basic Security
CCNA Discovery 4.0
PDF created with pdfFactory trial version www.pdffactory.com
http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
2/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Objectives
Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications. Describe the features of a firewall and how it can be used
to protect against an attack.
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
3/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Networking Threats
Risk of Network Intrusion
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
4/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Networking Threats
Sources of Network Intrusion
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
5/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Networking Threats
Social Engineering and Phishing
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
6/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Networking Threats
Social Engineering and Phishing
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
7/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Methods of Attack
Viruses, Worms and Trojan HorsesViruses Worm Trojan Horses
A virus is aprogram that runsand spreads by
modifying otherprograms or files
A virus cannotstart by itself; itneeds to beactivated
Viruses can betransmitted viaemail attachments,downloaded files,instant messagesor via diskette, CDor USB devices
Worm does notneed to attach itselfto an existing
programA worm uses thenetwork to sendcopies of itself toany connectedhosts
Worms can runindependently andspread quickly
A Trojan horse isa non-selfreplicating program
that is written toappear like alegitimate program,when in fact it is anattack tool
Trojans can also
create a back doorinto a systemallowing hackers togain access
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
8/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Methods of Attack
Denial of Service and Brute Force Attacks
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
9/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Methods of Attack
Spyware, Tracking Cookies, Adware and Pop-upsSpyware Tracking Cookies Adware Pop-ups
Spyware is anyprogram thatgathers personalinformation from
your computerwithout yourpermission orknowledge
Spyware is usuallyinstalled
unknowingly whendownloading a file,installing anotherprogram or clickinga popup
Difficult to remove
Cookies are aform of spyware butare not always bad
They are used to
record informationabout an Internetuser when they visitwebsites
Many web sitesrequire that cookies
be enabled in orderto allow the user toconnect.
Adware is a formof spyware used tocollect informationabout a user based
on websites the uservisits
Adware iscommonly installedby a user inexchange for a
"free" productAdware can bevery difficult touninstall
Pop-ups and pop-unders areadditionaladvertising windows
that display whenvisiting a web site
pop-ups and pop-unders are notintended to collectinformation about
the userPop-ups: open infront of the currentbrowser window.
Pop-unders: openbehind the currentbrowser window.
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
10/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Methods of Attack
Spam
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
11/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Security Policy
Common Security Measures
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
12/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Security Policy
Common Security MeasuresDescribe common security procedures
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
13/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Security Policy
Updates and PatchesDescribe how updates and patches relate to security issues.
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
14/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Security Policy
Anti-virus software features: Email checking - Scans incoming andoutgoing emails, and identifies suspicious
attachments.
Resident dynamic scanning - Checks
executable files and documents whenthey are accessed.
Scheduled scans - Virus scans can bescheduled to run at regular intervals
and check specific drives or the entire
computer.
Automatic Updates - Checks for, anddownloads, known virus characteristics
and patterns. Can be scheduled to check
or updates on a regular basis.
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
15/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Security Policy
Anti Spam
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
16/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Security Policy
Anti-Spyware
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
17/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Using Firewalls
What is Firewall Appliance-based firewalls - An appliance-based firewall is a firewall that is built-in
to a dedicated hardware device known as
a security appliance
Server-based firewalls - A server-basedfirewall consists of a firewall applicationthat runs on a network operating system
(NOS) such as UNIX, Windows or Novell
Integrated Firewalls - An integratedfirewall is implemented by adding
firewall functionality to an existing device,
such as a router
Personal firewalls - Personal firewallsreside on host computers and are not
designed for LAN implementations
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
18/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Using Firewalls
Using a Firewall to Protect Against an Attack
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
19/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Using Firewalls
Vulnerability Analysis
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
20/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Using Firewalls
Best Practices
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
21/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Summary
Networks can be open to intrusion through vulnerabilities insoftware, hardware attacks, or the weaknesses ofindividuals.
Effective network security is based on a variety of productsand services, combined with a thorough security policy.
A firewall controls traffic between networks and helpsprevent unauthorized access.
PDF created with pdfFactory trial version www.pdffactory.com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/ -
8/3/2019 CCNA Dis1 - Chapter 8 - Basic Security [Compatibility Mode]
22/22
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
PDF created with pdfFactory trial version www pdffactory com
http://www.bkacad.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.pdffactory.com/http://www.bkacad.com/