Your SlideShare is downloading. ×
CCNA Discovery 1 - Chapter 8
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

CCNA Discovery 1 - Chapter 8

1,870
views

Published on

Published in: Technology, Education

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,870
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Basic Security Networking for Home and Small Businesses – Chapter 8Version 4.0 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications. Describe the features of a firewall and how it can be used to protect against an attack. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Networking Threats Describe major risks of network intrusion © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Networking Threats Define the sources of network intrusion. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Networking Threats Describe social engineering and phishing © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Methods of Attack Describe viruses, worms, and Trojan horses. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Methods of Attack Denial of Service and Brute Force attacks © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Methods of Attack Describe spyware, tracking cookies, adware and pop- ups. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Methods of Attack Describe Spam © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Security Procedures and Applications Defining a security policy © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Security Procedures and Applications Define common security procedures © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Security Procedures and Applications Describe how updates and patches relate to security issues. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Security Procedures and Applications Anti-virus software © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Security Procedures and Applications SPAM prevention © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Security Procedures and Applications Anti-Spyware © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Firewall Features and How to Use them toProtect Against an Attack What is a firewall? © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Firewall Features and How to Use them toProtect Against an Attack Using a Firewall to Protect Against an Attack © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Firewall Features and How to Use them toProtect Against an Attack Vulnerability Analysis © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Firewall Features and How to Use them toProtect Against an Attack Security Best Practices © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Summary Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals. Effective network security is based on a variety of products and services, combined with a thorough security policy. A firewall controls traffic between networks and helps prevent unauthorized access. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21