• Save
CCNA Discovery 1 - Chapter 8
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

CCNA Discovery 1 - Chapter 8

on

  • 2,218 views

 

Statistics

Views

Total Views
2,218
Views on SlideShare
2,217
Embed Views
1

Actions

Likes
1
Downloads
2
Comments
0

1 Embed 1

http://118.98.222.155 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

CCNA Discovery 1 - Chapter 8 Presentation Transcript

  • 1. Basic Security Networking for Home and Small Businesses – Chapter 8Version 4.0 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications. Describe the features of a firewall and how it can be used to protect against an attack. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Networking Threats Describe major risks of network intrusion © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Networking Threats Define the sources of network intrusion. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Networking Threats Describe social engineering and phishing © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Methods of Attack Describe viruses, worms, and Trojan horses. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Methods of Attack Denial of Service and Brute Force attacks © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Methods of Attack Describe spyware, tracking cookies, adware and pop- ups. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Methods of Attack Describe Spam © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Security Procedures and Applications Defining a security policy © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Security Procedures and Applications Define common security procedures © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Security Procedures and Applications Describe how updates and patches relate to security issues. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Security Procedures and Applications Anti-virus software © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Security Procedures and Applications SPAM prevention © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Security Procedures and Applications Anti-Spyware © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Firewall Features and How to Use them toProtect Against an Attack What is a firewall? © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Firewall Features and How to Use them toProtect Against an Attack Using a Firewall to Protect Against an Attack © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Firewall Features and How to Use them toProtect Against an Attack Vulnerability Analysis © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Firewall Features and How to Use them toProtect Against an Attack Security Best Practices © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Summary Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals. Effective network security is based on a variety of products and services, combined with a thorough security policy. A firewall controls traffic between networks and helps prevent unauthorized access. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21