Discovery Home S B Chapter 8

567
-1

Published on

Published in: Technology
1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total Views
567
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
33
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Discovery Home S B Chapter 8

  1. 1. Basic Security Networking for Home and Small Businesses – Chapter 8
  2. 2. Objectives <ul><li>Identify and describe the various networking threats. </li></ul><ul><li>Identify different methods of attack. </li></ul><ul><li>Describe security procedures and applications. </li></ul><ul><li>Describe the features of a firewall and how it can be used to protect against an attack. </li></ul>
  3. 3. Networking Threats <ul><li>Describe major risks of network intrusion </li></ul>
  4. 4. Networking Threats <ul><li>Define the sources of network intrusion. </li></ul>
  5. 5. Networking Threats <ul><li>Describe social engineering and phishing </li></ul>
  6. 6. Methods of Attack <ul><li>Describe viruses, worms, and Trojan horses. </li></ul>
  7. 7. Methods of Attack <ul><li>Denial of Service and Brute Force attacks </li></ul>
  8. 8. Methods of Attack <ul><li>Describe spyware, tracking cookies, adware and pop-ups. </li></ul>
  9. 9. Methods of Attack <ul><li>Describe Spam </li></ul>
  10. 10. Security Procedures and Applications <ul><li>Defining a security policy </li></ul>
  11. 11. Security Procedures and Applications <ul><li>Define common security procedures </li></ul>
  12. 12. Security Procedures and Applications <ul><li>Describe how updates and patches relate to security issues. </li></ul>
  13. 13. Security Procedures and Applications <ul><li>Anti-virus software </li></ul>
  14. 14. Security Procedures and Applications <ul><li>SPAM prevention </li></ul>
  15. 15. Security Procedures and Applications <ul><li>Anti-Spyware </li></ul>
  16. 16. Firewall Features and How to Use them to Protect Against an Attack <ul><li>What is a firewall? </li></ul>
  17. 17. Firewall Features and How to Use them to Protect Against an Attack <ul><li>Using a Firewall to Protect Against an Attack </li></ul>
  18. 18. Firewall Features and How to Use them to Protect Against an Attack <ul><li>Vulnerability Analysis </li></ul>
  19. 19. Firewall Features and How to Use them to Protect Against an Attack <ul><li>Security Best Practices </li></ul>
  20. 20. Summary <ul><li>Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals. </li></ul><ul><li>Effective network security is based on a variety of products and services, combined with a thorough security policy. </li></ul><ul><li>A firewall controls traffic between networks and helps prevent unauthorized access. </li></ul>

×