Basic Security Networking for Home and Small Businesses – Chapter 8
Objectives <ul><li>Identify and describe the various networking threats. </li></ul><ul><li>Identify different methods of a...
Networking Threats <ul><li>Describe major risks of network intrusion  </li></ul>
Networking Threats <ul><li>Define the sources of network intrusion. </li></ul>
Networking Threats <ul><li>Describe social engineering and phishing  </li></ul>
Methods of Attack <ul><li>Describe viruses, worms, and Trojan horses. </li></ul>
Methods of Attack <ul><li>Denial of Service and Brute Force attacks </li></ul>
Methods of Attack <ul><li>Describe spyware, tracking cookies, adware and pop-ups. </li></ul>
Methods of Attack <ul><li>Describe Spam </li></ul>
Security Procedures and Applications <ul><li>Defining a security policy   </li></ul>
Security Procedures and Applications <ul><li>Define common security procedures   </li></ul>
Security Procedures and Applications <ul><li>Describe how updates and patches relate to security issues. </li></ul>
Security Procedures and Applications <ul><li>Anti-virus software  </li></ul>
Security Procedures and Applications <ul><li>SPAM   prevention </li></ul>
Security Procedures and Applications <ul><li>Anti-Spyware </li></ul>
Firewall Features and How to Use them to Protect Against an Attack <ul><li>What is a firewall? </li></ul>
Firewall Features and How to Use them to Protect Against an Attack <ul><li>Using a Firewall to Protect Against an Attack <...
Firewall Features and How to Use them to Protect Against an Attack <ul><li>Vulnerability Analysis </li></ul>
Firewall Features and How to Use them to Protect Against an Attack <ul><li>Security Best Practices </li></ul>
Summary <ul><li>Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses...
 
Upcoming SlideShare
Loading in...5
×

Discovery Home S B Chapter 8

530

Published on

Published in: Technology
1 Comment
0 Likes
Statistics
Notes
  • Be the first to like this

No Downloads
Views
Total Views
530
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
32
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Discovery Home S B Chapter 8

  1. 1. Basic Security Networking for Home and Small Businesses – Chapter 8
  2. 2. Objectives <ul><li>Identify and describe the various networking threats. </li></ul><ul><li>Identify different methods of attack. </li></ul><ul><li>Describe security procedures and applications. </li></ul><ul><li>Describe the features of a firewall and how it can be used to protect against an attack. </li></ul>
  3. 3. Networking Threats <ul><li>Describe major risks of network intrusion </li></ul>
  4. 4. Networking Threats <ul><li>Define the sources of network intrusion. </li></ul>
  5. 5. Networking Threats <ul><li>Describe social engineering and phishing </li></ul>
  6. 6. Methods of Attack <ul><li>Describe viruses, worms, and Trojan horses. </li></ul>
  7. 7. Methods of Attack <ul><li>Denial of Service and Brute Force attacks </li></ul>
  8. 8. Methods of Attack <ul><li>Describe spyware, tracking cookies, adware and pop-ups. </li></ul>
  9. 9. Methods of Attack <ul><li>Describe Spam </li></ul>
  10. 10. Security Procedures and Applications <ul><li>Defining a security policy </li></ul>
  11. 11. Security Procedures and Applications <ul><li>Define common security procedures </li></ul>
  12. 12. Security Procedures and Applications <ul><li>Describe how updates and patches relate to security issues. </li></ul>
  13. 13. Security Procedures and Applications <ul><li>Anti-virus software </li></ul>
  14. 14. Security Procedures and Applications <ul><li>SPAM prevention </li></ul>
  15. 15. Security Procedures and Applications <ul><li>Anti-Spyware </li></ul>
  16. 16. Firewall Features and How to Use them to Protect Against an Attack <ul><li>What is a firewall? </li></ul>
  17. 17. Firewall Features and How to Use them to Protect Against an Attack <ul><li>Using a Firewall to Protect Against an Attack </li></ul>
  18. 18. Firewall Features and How to Use them to Protect Against an Attack <ul><li>Vulnerability Analysis </li></ul>
  19. 19. Firewall Features and How to Use them to Protect Against an Attack <ul><li>Security Best Practices </li></ul>
  20. 20. Summary <ul><li>Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals. </li></ul><ul><li>Effective network security is based on a variety of products and services, combined with a thorough security policy. </li></ul><ul><li>A firewall controls traffic between networks and helps prevent unauthorized access. </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×