CCNA Discovery 1 - Chapter 8

2,465 views

Published on

Published in: Technology, Education
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,465
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
2
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

CCNA Discovery 1 - Chapter 8

  1. 1. Basic Security Networking for Home and Small Businesses – Chapter 8Version 4.0 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  2. 2. Objectives Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications. Describe the features of a firewall and how it can be used to protect against an attack. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  3. 3. Networking Threats Describe major risks of network intrusion © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  4. 4. Networking Threats Define the sources of network intrusion. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  5. 5. Networking Threats Describe social engineering and phishing © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  6. 6. Methods of Attack Describe viruses, worms, and Trojan horses. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  7. 7. Methods of Attack Denial of Service and Brute Force attacks © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  8. 8. Methods of Attack Describe spyware, tracking cookies, adware and pop- ups. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  9. 9. Methods of Attack Describe Spam © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  10. 10. Security Procedures and Applications Defining a security policy © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  11. 11. Security Procedures and Applications Define common security procedures © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  12. 12. Security Procedures and Applications Describe how updates and patches relate to security issues. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  13. 13. Security Procedures and Applications Anti-virus software © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  14. 14. Security Procedures and Applications SPAM prevention © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  15. 15. Security Procedures and Applications Anti-Spyware © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  16. 16. Firewall Features and How to Use them toProtect Against an Attack What is a firewall? © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  17. 17. Firewall Features and How to Use them toProtect Against an Attack Using a Firewall to Protect Against an Attack © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  18. 18. Firewall Features and How to Use them toProtect Against an Attack Vulnerability Analysis © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  19. 19. Firewall Features and How to Use them toProtect Against an Attack Security Best Practices © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  20. 20. Summary Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals. Effective network security is based on a variety of products and services, combined with a thorough security policy. A firewall controls traffic between networks and helps prevent unauthorized access. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  21. 21. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21

×