chapter 16: advanced security - prince sultan...

38
Chapter 16: Advanced Security ゥ 2007 Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 16 1 Advanced Security IT Essentials: PC Hardware and Software v4.0

Upload: lytu

Post on 10-Mar-2018

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Chapter 16:Advanced Security

© 2007 Cisco Systems, Inc. All rights reserved. Cisco PublicITE PC v4.0Chapter 16 1

Chapter 16:Advanced Security

IT Essentials: PC Hardware and Software v4.0

Page 2: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Purpose of this Presentation

List of chapter objectives

Overview of the chapter contents, includingstudent worksheetsstudent labsstudent activities

Reflection/Activities for instructors to complete toprepare to teach

Additional resources

To provide to instructors an overview of Chapter 16:

ITE PC v4.0Chapter 16 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

List of chapter objectives

Overview of the chapter contents, includingstudent worksheetsstudent labsstudent activities

Reflection/Activities for instructors to complete toprepare to teach

Additional resources

Page 3: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Chapter 16 Objectives 16.1 Outline security requirements based on customer

needs

16.2 Select security components based on customerneeds

16.3 Implement customer's security policy

16.4 Perform preventive maintenance on security

16.5 Troubleshoot security

ITE PC v4.0Chapter 16 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

16.1 Outline security requirements based on customerneeds

16.2 Select security components based on customerneeds

16.3 Implement customer's security policy

16.4 Perform preventive maintenance on security

16.5 Troubleshoot security

Page 4: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Chapter 16 Worksheets, Activities, Labs 16.1.1 Worksheet: Security Policy

16.2.2 Activity: Security Devices

16.2.3 Worksheet: Firewalls

16.3.2 Lab: Windows XP Firewall

16.5.3 Lab: Fix a Security Problem

16.5.3 Remote Technician: Fix a Security Problem

ITE PC v4.0Chapter 16 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

16.1.1 Worksheet: Security Policy

16.2.2 Activity: Security Devices

16.2.3 Worksheet: Firewalls

16.3.2 Lab: Windows XP Firewall

16.5.3 Lab: Fix a Security Problem

16.5.3 Remote Technician: Fix a Security Problem

Page 5: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Is the computer locatedat a home or a business?

Is there full-time Internetaccess?

Is the computer a laptop?

Outline Security RequirementsA security policy includes a comprehensive statement

about the level of security required and how thissecurity will be achieved.

ITE PC v4.0Chapter 16 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Is the computer locatedat a home or a business?

Is there full-time Internetaccess?

Is the computer a laptop?

Page 6: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Outline a Security Policy

Define an acceptable computer usage statement.

Identify the people permitted to use the computerequipment.

Identify devices that are permitted to be installed on anetwork, as well as the conditions of the installation.

Define the requirements necessary for data to remainconfidential on a network.

Determine a process for employees to acquire accessto equipment and data.

A collection of rules, guidelines, and checklists:

ITE PC v4.0Chapter 16 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Define an acceptable computer usage statement.

Identify the people permitted to use the computerequipment.

Identify devices that are permitted to be installed on anetwork, as well as the conditions of the installation.

Define the requirements necessary for data to remainconfidential on a network.

Determine a process for employees to acquire accessto equipment and data.

Page 7: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Security Hardware

To restrict access to premises, you might usebiometrics, fences, and/or door locks.

To protect the network infrastructure, you mightsecure telecom rooms, setup detection for unauthorizeduse of wireless, and/or setup hardware firewalls.

To protect individual computers, you might use cablelocks, laptop docking station locks and/or lockablecases.

To protect data, you might use lockable HD carriersand/or USP security dongles.

Identify hardware and equipment that can be used toprevent theft, vandalism, and data loss.

ITE PC v4.0Chapter 16 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

To restrict access to premises, you might usebiometrics, fences, and/or door locks.

To protect the network infrastructure, you mightsecure telecom rooms, setup detection for unauthorizeduse of wireless, and/or setup hardware firewalls.

To protect individual computers, you might use cablelocks, laptop docking station locks and/or lockablecases.

To protect data, you might use lockable HD carriersand/or USP security dongles.

Page 8: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Security Applications

Software Firewall

Intrusion Detection Systems (IDS)

Application and OS Patches

Anti-virus software and anti-malware software

Security applications protect the operating system andsoftware application data.

ITE PC v4.0Chapter 16 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Software Firewall

Intrusion Detection Systems (IDS)

Application and OS Patches

Anti-virus software and anti-malware software

Compare the cost of data loss to the expense of securityprotection, and then determine what tradeoffs areacceptable.

Page 9: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Selecting Security ComponentsConsider the following factors when deciding on securitycomponents:

Advantages anddisadvantages of a securitycomponent

Overlapping features andfunctions

Component setup andmaintenance requirements

Budget restrictions Real and perceived threats

ITE PC v4.0Chapter 16 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Advantages anddisadvantages of a securitycomponent

Overlapping features andfunctions

Component setup andmaintenance requirements

Budget restrictions Real and perceived threats

Page 10: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Security Techniques

Use encrypted passwords to login to the network Monitor network activity through logging and auditing Set up data encryption over wirelessEncryption methods include: Hash encoding uses an algorithm to track tampering Symmetric encryption uses a key to encode/decode data Asymmetric encryption uses one key to encode and

another key to decode VPN creates a virtual “secure tunnel”

Depending on the situation, more than one techniquemay be required.

ITE PC v4.0Chapter 16 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Use encrypted passwords to login to the network Monitor network activity through logging and auditing Set up data encryption over wirelessEncryption methods include: Hash encoding uses an algorithm to track tampering Symmetric encryption uses a key to encode/decode data Asymmetric encryption uses one key to encode and

another key to decode VPN creates a virtual “secure tunnel”

Page 11: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Access Control DevicesPhysical access control devices Lock

Conduit

Card key

Video surveillance

Guards

ITE PC v4.0Chapter 16 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Two-factor identification methodsfor access control

Lock

Conduit

Card key

Video surveillance

Guards

Smart card

Security key fob

Biometric device

Page 12: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Firewall Types

HardwareFirewall

• Free-standing and usesdedicated hardware

• Initial cost for hardwareand software updates canbe costly

• Multiple computers can beprotected

• Little impact on thecomputer performance

• Available as 3rd partysoftware and cost varies

• Included in Windows XPoperating system

• Typically protects only thecomputer it is installed on

• Uses the CPU, potentiallyslowing the computer

Software Firewall

ITE PC v4.0Chapter 16 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

• Free-standing and usesdedicated hardware

• Initial cost for hardwareand software updates canbe costly

• Multiple computers can beprotected

• Little impact on thecomputer performance

• Available as 3rd partysoftware and cost varies

• Included in Windows XPoperating system

• Typically protects only thecomputer it is installed on

• Uses the CPU, potentiallyslowing the computer

Page 13: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Configure Security SettingsTwo primary security settings include: Setting levels of permissions on folders and files

Use FAT or NTFS to configure folder sharing or folder-levelpermissions for users with network accessUse file-level permissions with NTFS to configure access to files

Securing wireless access points

ITE PC v4.0Chapter 16 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Wired Equivalent Privacy (WEP)Wi-Fi Protected Access (WPA)MAC address filteringUnused wireless connectionsService Set Identifier (SSID) BroadcastingWireless antenna

Setting levels of permissions on folders and filesUse FAT or NTFS to configure folder sharing or folder-levelpermissions for users with network accessUse file-level permissions with NTFS to configure access to files

Securing wireless access points

Page 14: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Configure Firewalls A restrictive firewall policy

(open only the required ports) A permissive firewall policy

(open all ports except thoseexplicitly denied)

Configure a software firewallmanually or to runautomatically.

Configure a hardware firewallby indicating what is filteredby port type, port number,source address, and/ordestination address.

ITE PC v4.0Chapter 16 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

A restrictive firewall policy(open only the required ports)

A permissive firewall policy(open all ports except thoseexplicitly denied)

Configure a software firewallmanually or to runautomatically.

Configure a hardware firewallby indicating what is filteredby port type, port number,source address, and/ordestination address.

Page 15: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Protect Against Malware

Anti-virus, anti-spyware, anti-adware, and phishingprograms

Phishing attacks trick the user into providing the personalinformation. A user’s data can be sold and/or used fraudulently.

Run software scanning programs to detect and removethe malicious software.

ITE PC v4.0Chapter 16 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Anti-virus, anti-spyware, anti-adware, and phishingprograms

Phishing attacks trick the user into providing the personalinformation. A user’s data can be sold and/or used fraudulently.

Page 16: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Operating System UpdatesWindows XP update options:

Automatic:Automatically downloads and installs without user intervention.

Only Download Updates:Download the updates automatically, but the user is required toinstall them.

Notify Me:Notify the user that updates are available and gives the user theoption to download and install.

Turn off Automatic Updates:Prevents automatically checking for updates. Updates have tobe discovered, downloaded and installed by the user.

ITE PC v4.0Chapter 16 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Windows XP update options:

Automatic:Automatically downloads and installs without user intervention.

Only Download Updates:Download the updates automatically, but the user is required toinstall them.

Notify Me:Notify the user that updates are available and gives the user theoption to download and install.

Turn off Automatic Updates:Prevents automatically checking for updates. Updates have tobe discovered, downloaded and installed by the user.

Page 17: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

User Account Maintenance Group employees by job requirements to give access

to files by setting up group permissions.

When an employee leaves an organization, access tothe network should be terminated immediately.

Guests can be given access through a Guest account.

ITE PC v4.0Chapter 16 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Group employees by job requirements to give accessto files by setting up group permissions.

When an employee leaves an organization, access tothe network should be terminated immediately.

Guests can be given access through a Guest account.

Page 18: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Data BackupsDescription

Full or NormalBackup Archives all selected files

IncrementalBackup

Archives all selected files that have changed sincelast full or incremental backup. It marks files ashaving been backed up.

ITE PC v4.0Chapter 16 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

IncrementalBackup

Archives all selected files that have changed sincelast full or incremental backup. It marks files ashaving been backed up.

DifferentialBackup

Archives everything that has changed since last fullbackup. It does not mark files as having been backedup.

Daily Backup Archives all selected files that have changed on theday of the backup

Copy Backup Archives all selected files

Page 19: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Step 1 Gather data from the customer

Step 2 Verify the obvious issues

Step 3 Try quick solutions first

Step 4 Gather data from the computer

Step 5 Evaluate the problem and implement the solution

Step 6 Close with the customer

Troubleshooting Process

ITE PC v4.0Chapter 16 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Step 1 Gather data from the customer

Step 2 Verify the obvious issues

Step 3 Try quick solutions first

Step 4 Gather data from the computer

Step 5 Evaluate the problem and implement the solution

Step 6 Close with the customer

Page 20: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Level-one Technician Gathers DataDescription of problem by the level-one helpdesk

technician:

Customer is unable to connect to the network usingwireless connection.

Customer cannot surf the Internet.Customer cannot access any resources on the network.Wireless does not seem to be working properly at the office.The customer has checked all settings.

The helpdesk technician was unable to resolve theproblem, so the work order is escalated to a level-twotechnician.

ITE PC v4.0Chapter 16 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Description of problem by the level-one helpdesktechnician:

Customer is unable to connect to the network usingwireless connection.

Customer cannot surf the Internet.Customer cannot access any resources on the network.Wireless does not seem to be working properly at the office.The customer has checked all settings.

The helpdesk technician was unable to resolve theproblem, so the work order is escalated to a level-twotechnician.

Page 21: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Open-Ended QuestionsHere are some open-ended questions that a level-two

technician might ask to gather more information fromthe customer in this scenario:

Which specific network resources are you trying toaccess with your wireless system?

Are there any network resources that you can accessby wireless?

When were you last able to access the network usingwireless at the office?

How does your computer perform using wireless atother locations?

ITE PC v4.0Chapter 16 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Here are some open-ended questions that a level-twotechnician might ask to gather more information fromthe customer in this scenario:

Which specific network resources are you trying toaccess with your wireless system?

Are there any network resources that you can accessby wireless?

When were you last able to access the network usingwireless at the office?

How does your computer perform using wireless atother locations?

Page 22: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Level-two Technician Draws ConclusionsBased on the information given by the customer to the

open-ended questions, these conclusions can bedetermined:

In the office, no resources can be accessed.

When operating away from the office, no problems areexperienced.

The problems started just after a new wireless routerwas installed.

ITE PC v4.0Chapter 16 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Based on the information given by the customer to theopen-ended questions, these conclusions can bedetermined:

In the office, no resources can be accessed.

When operating away from the office, no problems areexperienced.

The problems started just after a new wireless routerwas installed.

Page 23: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Closed-Ended QuestionsHere are some closed-ended questions that a level-two

technician might ask to gather more information fromthe customer in this scenario:

Is your network cable plugged in?

When you plug in your network cable, does everythingwork correctly?

From the answers to these questions, you determine thatthe customer is experiencing a wireless connectionproblem. Therefore, focus your efforts on a problemwith wireless connectivity in the office.

ITE PC v4.0Chapter 16 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Here are some closed-ended questions that a level-twotechnician might ask to gather more information fromthe customer in this scenario:

Is your network cable plugged in?

When you plug in your network cable, does everythingwork correctly?

From the answers to these questions, you determine thatthe customer is experiencing a wireless connectionproblem. Therefore, focus your efforts on a problemwith wireless connectivity in the office.

Page 24: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Verify the Obvious IssuesExamine the most obvious causes of a problem.

Does the access point appear to be on?

What lights on the access point are on or flashing?

Does anyone else have this problem?

Have you been able to connect to the Internet since thewireless router was upgraded?

Does this problem occur only at your desk or at otherareas of the office as well?

Have you been able to connect through wireless at anyother locations?

ITE PC v4.0Chapter 16 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Examine the most obvious causes of a problem.

Does the access point appear to be on?

What lights on the access point are on or flashing?

Does anyone else have this problem?

Have you been able to connect to the Internet since thewireless router was upgraded?

Does this problem occur only at your desk or at otherareas of the office as well?

Have you been able to connect through wireless at anyother locations?

Page 25: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Conclusions from Checking the Obvious The network login and password are valid.

The wireless card in the user's computer operatesnormally.

The problem is not interference with the wireless signal.

There is probably a wireless configuration issue.

ITE PC v4.0Chapter 16 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

The network login and password are valid.

The wireless card in the user's computer operatesnormally.

The problem is not interference with the wireless signal.

There is probably a wireless configuration issue.

Page 26: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Quick Solutions Check the wireless signal strength in various areas in

the office. Try connecting using wireless connection with security

settings turned off.Results of quick solutions: The wireless signal strength seems normal. Wireless connection works with security turned off.So the problem is probably a configuration issue. Check the configurations on the computer and on the

access point.

ITE PC v4.0Chapter 16 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Check the wireless signal strength in various areas inthe office.

Try connecting using wireless connection with securitysettings turned off.

Results of quick solutions: The wireless signal strength seems normal. Wireless connection works with security turned off.So the problem is probably a configuration issue. Check the configurations on the computer and on the

access point.

Page 27: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Gather Data from the ComputerDetermine the MAC address of the computer:

1. Select Start > Run

2. Type cmd in the Run box. The Command Lineinterface should appear

3. Enter ipconfig /all at the command prompt.

4. Write down the MAC address of the wireless NIC andof the Ethernet NIC.

No resolution to the problem has been found at this point.The problem is most likely to be found in theconfiguration of the wireless access point securitysettings.

ITE PC v4.0Chapter 16 27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Determine the MAC address of the computer:

1. Select Start > Run

2. Type cmd in the Run box. The Command Lineinterface should appear

3. Enter ipconfig /all at the command prompt.

4. Write down the MAC address of the wireless NIC andof the Ethernet NIC.

No resolution to the problem has been found at this point.The problem is most likely to be found in theconfiguration of the wireless access point securitysettings.

Page 28: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Evaluate Problem & Implement Solution1. What do you know now? Works using the Ethernet

cable

Works using wireless athome

Works using wireless when thesecurity is disabled

No one else has the problem

Doesn’t work when connected to the office wireless accesspoint

ITE PC v4.0Chapter 16 28© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Doesn’t work when connected to the office wireless accesspoint

Might be incorrect wireless access point configuration settings

The MAC address filter on the access point was incorrectlyconfigured for this customer.

Add the computer’s MAC address to the wireless access pointMAC address filter list.

2. Determine possible solutions

3. Implement the best solution

Page 29: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Close with the Customer Discuss with customer the solution implemented.

Have customer verify problem is solved.

Provide all paperwork to customer.

Document steps of solution.

Document components used in repair.

Document time spent to resolve the problem.

ITE PC v4.0Chapter 16 29© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Discuss with customer the solution implemented.

Have customer verify problem is solved.

Provide all paperwork to customer.

Document steps of solution.

Document components used in repair.

Document time spent to resolve the problem.

Page 30: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Common Problems and SolutionsProblem Symptom Possible Solution

A customer reports that a backup thatwas started the night before is stillgoing.

Advise the customer to implement adifferent type of backup that saves time.

A visiting consultant using a guestaccount cannot access needed files.

Grant access to the files for the durationof the visit. When the consultant leaves,disable the account.

ITE PC v4.0Chapter 16 30© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

A visiting consultant using a guestaccount cannot access needed files.

Grant access to the files for the durationof the visit. When the consultant leaves,disable the account.

A user refuses your request to e-mailyou their student ID number andpassword.

Inform the user that there was no suchrequest. Gather information and warnothers against this phishing attack.

A user can locate a file on the server butcannot download it.

Change the user permissions on this filefrom read to read and execute.

A user cannot connect to the networkusing a wireless router even after theproper security key has been installed.

Verify that the user’s MAC address islisted in the MAC address filter table.

Page 31: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Fix a Security ProblemNow that you understand the troubleshooting process, it

is time to apply your listening and diagnostic skills.

Receive the work order

Research the problem

Take the customer through various steps to try andresolve the problem

Document the problem and the resolution

ITE PC v4.0Chapter 16 31© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Now that you understand the troubleshooting process, itis time to apply your listening and diagnostic skills.

Receive the work order

Research the problem

Take the customer through various steps to try andresolve the problem

Document the problem and the resolution

Page 32: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Chapter 16 SummaryAdvanced Security

Security requirements for customers differ because ofbudget restraints, the type of equipment to secure, andthe decision regarding hardware and software security.

A security policy should be developed and used todetermine the type of firewall to be installed.

Hardware and software security tools are available toprotect data on a network.

Security policies should be followed by everyone in theorganization.

Preventive maintenance is an effective part of security.

ITE PC v4.0Chapter 16 32© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Advanced Security

Security requirements for customers differ because ofbudget restraints, the type of equipment to secure, andthe decision regarding hardware and software security.

A security policy should be developed and used todetermine the type of firewall to be installed.

Hardware and software security tools are available toprotect data on a network.

Security policies should be followed by everyone in theorganization.

Preventive maintenance is an effective part of security.

Page 33: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Instructor TrainingActivities

ITE PC v4.0Chapter 16 33© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Instructor TrainingActivities

Page 34: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Activities for Instructor Training1. Take the Quiz provided in Chapter 16 course content.

2. Collect examples from the recent news of peopleloosing government laptops or copying sensitive datain an un-encrypted form. Use these examples asdiscussion points in 16.1.1 Outline a local securitypolicy.

3. Conduct Internet research to pre-screen onlineresources for students to use in completing theworksheet, 16.2.3 Firewalls.

4. Brainstorm a list of at least 4 security problems to usefor students to practice their troubleshooting skills.

ITE PC v4.0Chapter 16 34© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

1. Take the Quiz provided in Chapter 16 course content.

2. Collect examples from the recent news of peopleloosing government laptops or copying sensitive datain an un-encrypted form. Use these examples asdiscussion points in 16.1.1 Outline a local securitypolicy.

3. Conduct Internet research to pre-screen onlineresources for students to use in completing theworksheet, 16.2.3 Firewalls.

4. Brainstorm a list of at least 4 security problems to usefor students to practice their troubleshooting skills.

Page 35: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Instructor Training Discussion Share with the other instructors the list of online

resources found that students might use in completingthe research portions of the worksheet.

Share with the other instructors the list of additionaltroubleshooting scenarios.

Participate in a role-playing activity of one of thetroubleshooting scenarios.

Following the role-playing activity, discuss thedifferent ways you might incorporate role-playingactivities into your classroom. Share ideas of how tomake the student successful in these activities.

ITE PC v4.0Chapter 16 35© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Share with the other instructors the list of onlineresources found that students might use in completingthe research portions of the worksheet.

Share with the other instructors the list of additionaltroubleshooting scenarios.

Participate in a role-playing activity of one of thetroubleshooting scenarios.

Following the role-playing activity, discuss thedifferent ways you might incorporate role-playingactivities into your classroom. Share ideas of how tomake the student successful in these activities.

Page 36: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Additional Resources Linksys: Learning Center http://www.linksys.com Home PC Firewall GuideTM http://www.firewallguide.com HowStuffWorks: It's Good to Know

http://computer.howstuffworks.com/firewall.htm United States Computer Emergence Readiness Team: Cyber Security Tip

http://www.us-cert.gov/cas/tips/ST04-004.html Microsoft: Security at Home: Firewall FAQs

http://www.microsoft.com/athome/security/protect/firewall.mspx ConsumerSearch: Firewalls Reviews, Best Firewalls

http://www.consumersearch.com/www/software/firewalls/index.html Matousec: Comparison of Top Five Personal Firewalls

http://www.matousec.com/projects/windows-personal-firewall-analysis/top-five-comparison.php

Computer Shopper, PC PRO UK: Personal Firewallshttp://www.pcpro.co.uk/shopper/labs/222/software-labs-personal-firewalls/introduction.html

Information Week: Safety First: 5 Firewalls for Your Desktop PChttp://www.informationweek.com/software/showArticle.jhtml?articleID=192201247

ITE PC v4.0Chapter 16 36© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Linksys: Learning Center http://www.linksys.com Home PC Firewall GuideTM http://www.firewallguide.com HowStuffWorks: It's Good to Know

http://computer.howstuffworks.com/firewall.htm United States Computer Emergence Readiness Team: Cyber Security Tip

http://www.us-cert.gov/cas/tips/ST04-004.html Microsoft: Security at Home: Firewall FAQs

http://www.microsoft.com/athome/security/protect/firewall.mspx ConsumerSearch: Firewalls Reviews, Best Firewalls

http://www.consumersearch.com/www/software/firewalls/index.html Matousec: Comparison of Top Five Personal Firewalls

http://www.matousec.com/projects/windows-personal-firewall-analysis/top-five-comparison.php

Computer Shopper, PC PRO UK: Personal Firewallshttp://www.pcpro.co.uk/shopper/labs/222/software-labs-personal-firewalls/introduction.html

Information Week: Safety First: 5 Firewalls for Your Desktop PChttp://www.informationweek.com/software/showArticle.jhtml?articleID=192201247

Page 37: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

Q and A

ITE PC v4.0Chapter 16 37© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Page 38: Chapter 16: Advanced Security - Prince Sultan Universityinfo.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture Slides...Chapter 16 Objectives ð 16.1 Outline security requirements based

ITE PC v4.0Chapter 16 38© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public