SlideShare a Scribd company logo
1 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Objectives


                 In this session, you will learn to:
                    Identify the major WAN switching technologies.
                    Identify the major transmission technologies for WANs.
                    Identify the major WAN connectivity methods.
                    Identify major Voice over Data systems.
                    Identify the major categories of network threats.
                    Identify the elements of a virus protection plan.
                    Identify the components of local network security.




      Ver. 1.0                      Session 8                                Slide 1 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 WAN Switching Technologies


                 In Wide Area Network (WAN) data can move using a
                 number of different switching techniques, such as:
                     Circuit Switching Networks
                     Virtual Circuits
                     Packet Switching Networks
                     Cell Switching Networks
                 These switching methods can have a great effect on
                 network characteristics such as performance and reliability.




      Ver. 1.0                     Session 8                          Slide 2 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Circuit Switching Networks


                 •   In circuit switching networks, a single path from one
                     endpoint to another is built when a connection is needed.




                                Modem                                  Modem

                                                 Path built when
                                              circuit is established




      Ver. 1.0                          Session 8                              Slide 3 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Virtual Circuits


                  •   Virtual circuits are a routing technique that connects
                      endpoints logically through a provider’s network.


                                                            Logical
                                                          connections




                      Permanent virtual circuits:                       Switched virtual circuits: Provider
                      Provider network always on                         network connects when needed




       Ver. 1.0                                     Session 8                                                 Slide 4 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Packet Switching Networks


                 •   Packet switching networks move data through the
                     network packet by packet.
                 •   Each packet takes the best route available at any given time
                     rather than following an established circuit.



                                                    1



                                                2


                                                3



                                          Each packet finds
                                            its own route




      Ver. 1.0                        Session 8                          Slide 5 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Cell Switching Networks


                 •   Cell switching networks data is divided into fixed-length
                     cells instead of variable-length packets.
                 •   The advantage of cell switching over packet switching is its
                     predictability.




      Ver. 1.0                         Session 8                           Slide 6 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 WAN Transmission Technologies


                 Transmission technologies are another component of a
                 WAN implementation.
                 The transmission method of WAN affects overall network
                 performance.




      Ver. 1.0                   Session 8                         Slide 7 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Dial-Up Connections


                 •   Dial-up lines are local loop Public Switched Telephone
                     Network (PSTN) that:
                        Use modems
                        Use Existing phone lines
                        Provide Low-bandwidth WAN connectivity
                        Provide Remote network access
                                            PSTN




      Ver. 1.0                        Session 8                       Slide 8 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Dedicated and Leased Data Lines


                 •   Dedicated lines and leased lines provide a dedicated
                     connection between two endpoints.
                 •   These are lines are used by companies to provide a high-
                     quality connection between two locations.


                                         Telco network




                                         Leased data lines




      Ver. 1.0                        Session 8                         Slide 9 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Integrated Services Digital Network (ISDN)


                 •   ISDN is a digital circuit switching technology that carries
                     both voice and data over digital phone lines or PSTN wires.

                           Subscriber                             Telco



                                                                             Packet
                                                                          data network




                                                                           Switched
                                                                          data network




                                                                             Private
                                                                          line network
                      ISDN adapter                  ISDN switch




      Ver. 1.0                          Session 8                                        Slide 10 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Cable Access


                 •   Cable Internet access uses a cable television connection
                     and a cable modem to provide high-speed Internet access
                     to homes and small businesses.




                                         Cable modem



                                                              ISP
                                    TV signal




                                                                    Cable TV feed




      Ver. 1.0                         Session 8                               Slide 11 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Digital Subscriber Line (DSL)


                 •   DSL is a broadband Internet connection method that
                     transmits digital signals over existing phone lines.

                            Customer
                                                            Telco




                                            Local loop
                                            phone line                                    Voice
                                                                      PSTN




                                                                    Multiplexer
                                       DSL modem
                                                                                          Digital




      Ver. 1.0                             Session 8                              Slide 12 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 X.25 Switched Networks


                 •   X.25 is a legacy packet switching network technology to
                     move data across the less-than-reliable long-distance public
                     carriers available at that time.
                     Customer network
                      Data Terminal
                     Equipment (DTE)




                                        X.25 backbone




                                           Data Circuit
                                           Equipment
                                             (DCE)


                                                               Packet Switching
                                                                  Equipment
                                                                    (PSE)




      Ver. 1.0                                     Session 8                      Slide 13 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Frame Relay


                 •   Frame relay is a packet switching implementation first
                     offered in 1992 by AT&T and Sprint as a more efficient
                     alternative to X.25. It was originally developed to support
                     PRI-ISDN networks.
                        Customer
                         network                       Clean carrier networks
                           DTE                      Less error checking required




                                      DCE



                                                            Frame Relay
                                                           Bearer Services
                                                               (FRBS)


      Ver. 1.0                         Session 8                                   Slide 14 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Asynchronous Transfer Mode (ATM)


                 •   Asynchronous Transfer Mode (ATM) is a versatile, cell
                     switching network technology designed for deployment in
                     LANs, WANs, and telephone networks.


                                   Private ATM LAN                Public ATM network


                                         Data




                     Voice                           ATM switch



                                          Video



                             Endpoints


      Ver. 1.0                                       Session 8                         Slide 15 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 T-Carrier Systems


                 •   The T-Carrier system was designed to carry multiplexed
                     telephone connections. T1 and T3 are the two most
                     common T-service levels.
                                        T-Carrier circuit




                                        T1: 24 channels
                                        T3: 672 channels




      Ver. 1.0                       Session 8                        Slide 16 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Synchronous Optical Network (SONET)


                 •   SONET is a standard with the following features:
                         Synchronous data transport over fiber optic cable
                         Excellent bandwidth
                         Built-in fault recovery
                         Speeds up to 2.48 GBps
                         Optical Carrier (OC) and Synchronous Transport Signal (STS)
                         specifications
                         Self-healing dual-fiber ring




      Ver. 1.0                         Session 8                            Slide 17 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 SONET Network Components


                 A SONET network is divided into three areas:
                    Broadband backbone network
                    Regional network
                    Collector ring                                                   Routes between
                                                                                    regional networks



                                                     Broadband backbone network
                                                      Broadband backbone network



                                                                                      Joins multiple
                                                                                      collector rings


                         Integrated management             Regional network

                                                                                       DCS to place
                                                                                   customer’s signal on
                                                                                          ring
                                                             Collector ring


                                                                  LAN




      Ver. 1.0                           Session 8                                              Slide 18 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Unbounded WAN Media


                 •     Unbounded media such as satellite linkups are employed
                       for truly long-range WAN transmission.




                              T1
                                                                 T1
                 LAN                                                        LAN




      Ver. 1.0                         Session 8                       Slide 19 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Activity 10-2




                     Activity on Installing a Modem




      Ver. 1.0                 Session 8                       Slide 20 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Activity 10-3




                          Activity on Creating a
                           Dial-Up Connection




      Ver. 1.0                 Session 8                       Slide 21 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 WAN Connectivity Methods


                 WAN connectivity methods help transmit WAN data.
                 The various WAN connectivity methods are:
                    Multiplexers in WAN Connectivity
                    Channel Service Unit/Data Service Unit (CSU/DSU)
                    Telephone Modem Standards
                    Internet Connection Sharing (ICS)




      Ver. 1.0                    Session 8                            Slide 22 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Multiplexers in WAN Connectivity


                 •   A multiplexer (mux) is used to combine multiple data
                     signals onto WAN transmission media.

                         LAN




                                                            T-1
                         LAN


                                                  T-1 mux



                                                                  ISP




                                    PBX




      Ver. 1.0                        Session 8                         Slide 23 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Channel Service Unit/Data Service Unit (CSU/DSU)


                 •   CSU/DSU is a combination of two WAN connectivity
                     devices that work together to terminate the ends of a digital
                     T1 or T3 line from a telephone company network.


                                         LAN




                                   Router (DTE)

                            DSU
                                                     Telco network

                            CSU




      Ver. 1.0                           Session 8                         Slide 24 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Telephone Modem Standards


                 •   Current modem standards known as V Dot Standards are
                     set by the International Telecommunications Union (ITU).
                 •   The following table lists some of the most common
                     standards:
                     ITU Standard   Speed


                     V.32           9,600 bps synchronous; 4,800 bps asynchronous


                     V.32 bis       14.4 Kbps synchronous and asynchronous


                     V.34           28.8 Kbps


                     V.34 bis       33.6 Kbps


                     V.42           57.6 Kbps; specifies standards for error checking


                     V.42 bis       57.6 Kbps; specifies standards for compression


                     V.90           56 Kbps upstream; 33.6 Kbps downstream because downstream data is modulated




      Ver. 1.0                                  Session 8                                                         Slide 25 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Internet Connection Sharing (ICS)


                 •   ICS is a WAN connectivity method for Windows computer
                     systems that connects multiple computers to the Internet by
                     using a single Internet connection.




                                                  ICS host
                                                                     ISP




      Ver. 1.0                        Session 8                            Slide 26 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Activity 10-4




                        Activity on Examining ICS
                             Configuration on
                          Windows Server 2003




      Ver. 1.0                 Session 8                       Slide 27 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Voice Over Data Systems


                 •   Voice over Data systems are communications systems
                     that transmit analog voice communications over digital WAN
                     networking technologies.
                                                              PBX




                                                           Voice agent




                                                                                       LAN
                                         Voice agent                     Voice agent

                           Fax Machine




                                                           Voice agent


                                              PC with
                                              dial out




      Ver. 1.0                                 Session 8                                     Slide 28 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Voice Over IP ( VoIP)


                 •   VoIP is a Voice over Data implementation in which voice
                     signals are transmitted over IP networks.
                                                      PBX




                                                       VoIP
                                                     Interface




                       VoIP-compatible
                         fax machine




      Ver. 1.0                           Session 8                      Slide 29 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Network Threats


                 Network security can be obtained by protecting the network
                 from network threats.
                 The different types of network threats that can affect the
                 network are:
                    Unauthorized Access
                    Data Theft
                    Password Attacks
                    Brute Force Password Attacks
                    Trojan Horse Attacks
                    Data Protection Methods




      Ver. 1.0                    Session 8                         Slide 30 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Network Threats (Contd.)


                  The Spoofing Process
                  Session Hijacking Attacks
                  Man-in-the-Middle Attacks
                  Denial of Service (DoS) Attacks
                  Distributed Denial of Service (DDoS) Attacks
                  Viruses
                  Social Engineering Attacks
                  Data Protection Methods




      Ver. 1.0                   Session 8                       Slide 31 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Unauthorized Access


                 •       Unauthorized access is any type of network or data access that is
                         not explicitly approved by the organization.




                                                                                      Attacker
                                                                  Deliberate attack
                                                                     by outsider



                     Intentional or
                      unintentional
                         misuse




      Ver. 1.0                              Session 8                                      Slide 32 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Data Theft


                 •   Data theft is a type of attack in which unauthorized access
                     is used to obtain protected network information.
                            Files on server




                                              Data in transit




                                                                       Attacker




      Ver. 1.0                                Session 8                    Slide 33 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Password Attacks


                 •   A password attack is any type of unauthorized effort to
                     discover a user’s valid password.




                                            User01                      Attacker
                                         easy password



                                                                           Steal or
                                                                       guess password




      Ver. 1.0                        Session 8                           Slide 34 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Brute Force Password Attacks


                 •   A brute force password attack is a method of guessing
                     passwords by using software that systematically generates
                     password combinations until a valid one is found.

                                         xxxxxxxxx
                                         xPxxxxxxx
                                         xPassxxxx
                                         xPass1234
                                         !Pass1234




                      User                                  Attacker




      Ver. 1.0                        Session 8                         Slide 35 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Trojan Horse Attacks


                 •   A Trojan horse attack is an attempt to gain unauthorized
                     access through the use of a Trojan horse program, which
                     masquerades as valid software.
                                   Program performs
                                     unauthorized
                                       functions




                                                                         Attacker




                                                                    Attacker sends valid-
                                                                      looking program




      Ver. 1.0                          Session 8                         Slide 36 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Spoofing Attacks


                 •     A spoofing attack is a type of attack in which a device
                       outside the network uses an internal network address to
                       masquerade as a device inside the network.

                 Real IP address:
                   10.10.10.25


                                      Source IP address: 192.168.0.10
                                    Destination IP address: 192.168.0.77




                                             IP Packet




                 Attacker




                                                                              Target
                                                                           192.168.0.77



      Ver. 1.0                                           Session 8                        Slide 37 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 The Spoofing Process


                 •   Spoofing process consists of following steps:
                     1.   Identify target
                     2.   Identify trusted host
                     3.   Disable trusted host
                     4.   Steal trusted host’s identity
                     5.   Redirect data from target
                           Real IP address:
                             10.10.10.25

                                                                                                              2
                                                Source IP address: 192.168.0.10
                                              Destination IP address: 192.168.0.77                            3
                                                                      4
                                                                                           Trusted host
                                                                                           192.168.0.10


                                                          IP Packet


                           Attacker                                                  5                        1

                                                                                            Target
                                                                                         192.168.0.77


      Ver. 1.0                                         Session 8                                          Slide 38 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Session Hijacking Attacks


                 •   Session hijacking is a type of spoofing in which the
                     attacker takes over an existing network communication
                     session between two devices after the session has already
                     been authenticated.




                     Client                       Attacker           Server




      Ver. 1.0                        Session 8                          Slide 39 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Man-in-the-Middle Attacks


                 •   A man-in-the-middle attack is a data-theft technique in
                     which the attacker interposes a device between two
                     legitimate hosts to gain access to their data transmissions.




                     Server                                  Client




                                        Attacker




      Ver. 1.0                         Session 8                           Slide 40 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Denial of Service (DoS) Attacks


                 •   DoS attack is an attack that is mounted for the purpose of
                     disabling systems that provide network services, rather than
                     to steal data or inflict damage.


                                                     Ping

                                                     Ping

                                                     Ping

                                                     Ping



                              Attacker




      Ver. 1.0                           Session 8                       Slide 41 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Distributed Denial of Service (DDoS) Attacks


                 •   DDoS attack is a type of DoS attack that uses multiple
                     computers on disparate networks to launch the attack from
                     many simultaneous sources.

                                                      Ping

                                                      Ping

                                                      Ping

                                                      Ping

                          Attacker
                                                      Ping

                                                      Ping

                                             Drones




      Ver. 1.0                         Session 8                        Slide 42 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Viruses


                 •   A virus is a self-propagating unauthorized software
                     program.
                 •   Virus attacks do not have a specific target or goal.




                                                                    Attacker




      Ver. 1.0                         Session 8                               Slide 43 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Social Engineering Attacks


                 •   A social engineering attack is a non-technical attack in
                     which the attacker attempts to obtain information directly
                     from network users by employing deception and trickery.




                                                 1
                                                     User name
                                                     Password



                                                 2
                                     Attacker




                                                                 Target




      Ver. 1.0                           Session 8                         Slide 44 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Data Protection Methods


                 To protect the data on your network, you need to:
                     Monitor for unauthorized software.
                     Limit physical access to network.
                     Require strong passwords.
                     Employ strong authentication and encryption on stored data.
                     Use multiple forms of authentication between devices.
                     Encrypt data during transmission.
                     Conceal network address information.
                     Train users to recognize and deter social engineering attacks.




      Ver. 1.0                      Session 8                              Slide 45 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Virus Infection Methods


                 Virus are the most common network threats, so a good
                 defense plan is necessary of securing the network
                 Virus can propagate through the following methods:
                    Attaching to media
                    Attaching to file                            Attach to media

                    Attaching to email




                                                                  Attach to file




                                                                 Attach to email




      Ver. 1.0                    Session 8                        Slide 46 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Virus Types


                 Types of Viruses are:
                    Boot sector: Writes itself into the boot sector of a floppy disk
                    File infecting: Infects executable programs and uses OS
                    resources to propagate itself
                    Macro: Uses other programs macro engines to propagate or
                    dump its payload
                    Mailer and mass mailer: Sends itself to other users using e-
                    mail systems
                    Polymorphic: Changes as it moves around
                    Script: Runs code using the Windows scripting host
                    Stealth: Moves and attempts to conceal itself until it
                    propagates
                    Worm: Detects connections and establishes communication
                    with other devices on its own


      Ver. 1.0                      Session 8                                Slide 47 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Antivirus Software


                 •   Antivirus software is an application that scans files for
                     executable code that matches patterns, known as
                     signatures or definitions.




                                Antivirus perimeter




                                                          Antivirus deployed
                                                               at clients



      Ver. 1.0                                Session 8                        Slide 48 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Updating Virus Definitions


                 Antivirus software vendors maintain and update the libraries
                 of virus definitions
                 Customers must periodically update the definitions on all
                 systems where the software is installed.




                      Antivirus                 Antivirus
                  software vendor                server



                                                            Antivirus clients




      Ver. 1.0                      Session 8                                   Slide 49 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Internet Email Virus Protection


                 •   Internet email is a source of serious virus threats.
                 •   Internet email virus protection by deploying antivirus:
                          On mail connector
                          On Internet gateway
                          At desktop

                                                     Antivirus deployed
                                                     on mail connector




                               Antivirus deployed
                               on Internet gateway




                                                                          Antivirus deployed at desktop




      Ver. 1.0                                 Session 8                                                  Slide 50 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Local Security


                 Security is implemented in a local network using a security
                 plan.
                 To ensure security for its users, systems, and data, security
                 measures are implemented on different levels and on
                 different components of the network.




      Ver. 1.0                     Session 8                          Slide 51 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Share-Level and User-Level Security


                 Two primary models for implementing security in local area
                 network are:
                     Share-level security
                     User-level security


                                                           User logs on
                               Password1



                                                                                Authentication
                               Password2               User gets access token       server




                               Password3

                                                       User presents token
                                                       to access resources        Resource
                                                                                   server



                          Share level                      User level



      Ver. 1.0                             Session 8                                      Slide 52 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Rights


                 •   A right is a security setting that controls whether or not a
                     user can perform a system wide function such as shutting
                     down a computer or logging on to a server.


                                                     Shut down the system




                                                     Log on locally




                             User01


                                                     Change system time




      Ver. 1.0                         Session 8                            Slide 53 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Permissions


                 •   A permission is a security setting that determines the level of
                     access a user or group account has to a particular resource.


                                                            Administrators: Full access




                                                            User01: Read-only access


                 Marketing
                 documents




                                                            Contractors: No access




      Ver. 1.0                           Session 8                                        Slide 54 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 The NTFS File System


                 NTFS File system provides five-levels of security to the
                 drives.
                 NTFS permissions can be applied either to folders or to
                 individual files.


                                         NTFS




      Ver. 1.0                     Session 8                          Slide 55 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Users and Groups


                    Rights and permissions can be assigned to individual user
                    accounts or to group of users.




                                      Combine into group         Grant access
                                                                 to resources




                 Users with similar
                  security needs


      Ver. 1.0                         Session 8                            Slide 56 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Effective Permissions


                 •   When a user is a member of multiple groups that each have
                     permissions to a resource, the user’s total effective
                     permission is the combination of all the separate permission
                     assignments.




                         Managers
                                    Write Access                          Read and
                                                                         Write Access




                                                      User01




                           Sales
                                    Read Access


      Ver. 1.0                          Session 8                        Slide 57 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Share and File System Permissions


                 •   When you share a folder for network use, you can assign a
                     separate set of permissions to the shared folder.
                 •   The share permissions on Windows systems are Read,
                     Change, and Full Control.
                                                             Access on local computer:
                                                           File system permissions apply




                                 Access through network:
                          Share and file system permissions apply




      Ver. 1.0                                    Session 8                                Slide 58 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Activity 11-3




                        Activity on Implementing
                              Local Security




      Ver. 1.0                 Session 8                       Slide 59 of 60
CompTIA N+ Certification: Wide AreaUsing Attended Installation
 Installing Windows XP Professional Network (WAN) Infrastructure and
Network Security
 Summary


                 In this session, you learned that:
                     In Wide Area Network (WAN), data can move using a number
                     of different switching techniques.
                     To implement WAN, different transmission technologies are
                     used that affect the network performance.
                     To transmit WAN, data WAN connectivity models are used.
                     There are different categories of network threats that affect the
                     security of the network.
                     There are different type of data protection techniques used to
                     protect the network from the network threats.
                     The security in a local network can be implemented at different
                     levels on different components of the network.




      Ver. 1.0                      Session 8                                Slide 60 of 60

More Related Content

What's hot

Comp tia n+_session_12
Comp tia n+_session_12Comp tia n+_session_12
Comp tia n+_session_12Niit Care
 
Comp tia n+_intro_session
Comp tia n+_intro_sessionComp tia n+_intro_session
Comp tia n+_intro_sessionNiit Care
 
Comp tia a+_session_15
Comp tia a+_session_15Comp tia a+_session_15
Comp tia a+_session_15Niit Care
 
Comp tia n+_session_09
Comp tia n+_session_09Comp tia n+_session_09
Comp tia n+_session_09Niit Care
 
Comp tia a+_session_03
Comp tia a+_session_03Comp tia a+_session_03
Comp tia a+_session_03Niit Care
 
Cs 704 d dce ipc-msgpassing
Cs 704 d dce ipc-msgpassingCs 704 d dce ipc-msgpassing
Cs 704 d dce ipc-msgpassingDebasis Das
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionSenetas
 
preparing network connections
preparing network connectionspreparing network connections
preparing network connectionsaibad ahmed
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10Yustinus Malawau
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...Juniper Networks
 
Course syllabus ccna
Course syllabus ccnaCourse syllabus ccna
Course syllabus ccnasaffatbd
 
#NSD14 - Sécuriser l'infrastructure réseau des datacenters
#NSD14 - Sécuriser l'infrastructure réseau des datacenters#NSD14 - Sécuriser l'infrastructure réseau des datacenters
#NSD14 - Sécuriser l'infrastructure réseau des datacentersNetSecure Day
 
DIGIPARTY – A DECENTRALIZED MULTI-PARTY VIDEO CONFERENCING SYSTEM
DIGIPARTY – A DECENTRALIZED MULTI-PARTY VIDEO CONFERENCING SYSTEMDIGIPARTY – A DECENTRALIZED MULTI-PARTY VIDEO CONFERENCING SYSTEM
DIGIPARTY – A DECENTRALIZED MULTI-PARTY VIDEO CONFERENCING SYSTEMVideoguy
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...Juniper Networks
 

What's hot (19)

Comp tia n+_session_12
Comp tia n+_session_12Comp tia n+_session_12
Comp tia n+_session_12
 
Comp tia n+_intro_session
Comp tia n+_intro_sessionComp tia n+_intro_session
Comp tia n+_intro_session
 
Comp tia a+_session_15
Comp tia a+_session_15Comp tia a+_session_15
Comp tia a+_session_15
 
Comp tia n+_session_09
Comp tia n+_session_09Comp tia n+_session_09
Comp tia n+_session_09
 
Comp tia a+_session_03
Comp tia a+_session_03Comp tia a+_session_03
Comp tia a+_session_03
 
Cs 704 d dce ipc-msgpassing
Cs 704 d dce ipc-msgpassingCs 704 d dce ipc-msgpassing
Cs 704 d dce ipc-msgpassing
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
 
preparing network connections
preparing network connectionspreparing network connections
preparing network connections
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10
 
Sonic wall tz series
Sonic wall tz seriesSonic wall tz series
Sonic wall tz series
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
Ccna security
Ccna securityCcna security
Ccna security
 
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
 
Course syllabus ccna
Course syllabus ccnaCourse syllabus ccna
Course syllabus ccna
 
#NSD14 - Sécuriser l'infrastructure réseau des datacenters
#NSD14 - Sécuriser l'infrastructure réseau des datacenters#NSD14 - Sécuriser l'infrastructure réseau des datacenters
#NSD14 - Sécuriser l'infrastructure réseau des datacenters
 
Openstack@ebay.pptx
Openstack@ebay.pptxOpenstack@ebay.pptx
Openstack@ebay.pptx
 
DIGIPARTY – A DECENTRALIZED MULTI-PARTY VIDEO CONFERENCING SYSTEM
DIGIPARTY – A DECENTRALIZED MULTI-PARTY VIDEO CONFERENCING SYSTEMDIGIPARTY – A DECENTRALIZED MULTI-PARTY VIDEO CONFERENCING SYSTEM
DIGIPARTY – A DECENTRALIZED MULTI-PARTY VIDEO CONFERENCING SYSTEM
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
 

Viewers also liked

02 iec t1_s1_plt_session_02
02 iec t1_s1_plt_session_0202 iec t1_s1_plt_session_02
02 iec t1_s1_plt_session_02Niit Care
 
02 t1 s2_linux_lesson2
02 t1 s2_linux_lesson202 t1 s2_linux_lesson2
02 t1 s2_linux_lesson2Niit Care
 
Presemtation Storage Devices
Presemtation Storage DevicesPresemtation Storage Devices
Presemtation Storage DevicesDjorkayf
 
01 iec t1_s1_plt_session_01
01 iec t1_s1_plt_session_0101 iec t1_s1_plt_session_01
01 iec t1_s1_plt_session_01Niit Care
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11Nil Menon
 
Ms sql server architecture
Ms sql server architectureMs sql server architecture
Ms sql server architectureAjeet Singh
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt finalArushi Garg
 

Viewers also liked (19)

Hard disks
Hard disksHard disks
Hard disks
 
Dacj 1-3 b
Dacj 1-3 bDacj 1-3 b
Dacj 1-3 b
 
02 iec t1_s1_plt_session_02
02 iec t1_s1_plt_session_0202 iec t1_s1_plt_session_02
02 iec t1_s1_plt_session_02
 
Sql xp 09
Sql xp 09Sql xp 09
Sql xp 09
 
02 t1 s2_linux_lesson2
02 t1 s2_linux_lesson202 t1 s2_linux_lesson2
02 t1 s2_linux_lesson2
 
Sql xp 10
Sql xp 10Sql xp 10
Sql xp 10
 
Sql xp 11
Sql xp 11Sql xp 11
Sql xp 11
 
Presemtation Storage Devices
Presemtation Storage DevicesPresemtation Storage Devices
Presemtation Storage Devices
 
Sql xp 01
Sql xp 01Sql xp 01
Sql xp 01
 
01 iec t1_s1_plt_session_01
01 iec t1_s1_plt_session_0101 iec t1_s1_plt_session_01
01 iec t1_s1_plt_session_01
 
SQL | Computer Science
SQL | Computer ScienceSQL | Computer Science
SQL | Computer Science
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
MS-SQL SERVER ARCHITECTURE
MS-SQL SERVER ARCHITECTUREMS-SQL SERVER ARCHITECTURE
MS-SQL SERVER ARCHITECTURE
 
Sql server basics
Sql server basicsSql server basics
Sql server basics
 
Hard disk PPT
Hard disk PPTHard disk PPT
Hard disk PPT
 
Ajs 1 b
Ajs 1 bAjs 1 b
Ajs 1 b
 
Conflict Management
Conflict ManagementConflict Management
Conflict Management
 
Ms sql server architecture
Ms sql server architectureMs sql server architecture
Ms sql server architecture
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
 

Similar to Comp tia n+_session_08

SDN Application Delivery
SDN Application DeliverySDN Application Delivery
SDN Application DeliveryNimit Shishodia
 
Networking Basics - Sales Account Manager Training
Networking Basics - Sales Account Manager TrainingNetworking Basics - Sales Account Manager Training
Networking Basics - Sales Account Manager TrainingArjun V
 
AD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxAD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxRahafKhalid14
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1Chaing Ravuth
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerRobb Boyd
 
KBC Networks Product presentation
KBC Networks Product presentationKBC Networks Product presentation
KBC Networks Product presentationKBC Networks
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1Waqas Ahmed Nawaz
 
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp011ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01Hussein Elmenshawy
 
2 roberto - mining - presentation-v3
2   roberto  - mining - presentation-v32   roberto  - mining - presentation-v3
2 roberto - mining - presentation-v3GE_Energy
 
Interoperabilty And Conformance Testing
 Interoperabilty And Conformance Testing Interoperabilty And Conformance Testing
Interoperabilty And Conformance TestingAJAL A J
 
Tns data center presentation
Tns data center presentationTns data center presentation
Tns data center presentationSanjeev Jain
 
Managed HD Video Conferencing
Managed HD Video ConferencingManaged HD Video Conferencing
Managed HD Video ConferencingVideoguy
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPEMichelle Holley
 
Presentation file
Presentation filePresentation file
Presentation fileVideoguy
 
Presentation file
Presentation filePresentation file
Presentation fileVideoguy
 
Tw 22501b Managed Ipvpn.
Tw 22501b Managed Ipvpn.Tw 22501b Managed Ipvpn.
Tw 22501b Managed Ipvpn.MICHAELMOONEY
 

Similar to Comp tia n+_session_08 (20)

SDN Application Delivery
SDN Application DeliverySDN Application Delivery
SDN Application Delivery
 
Networking Basics - Sales Account Manager Training
Networking Basics - Sales Account Manager TrainingNetworking Basics - Sales Account Manager Training
Networking Basics - Sales Account Manager Training
 
AD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxAD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptx
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
 
KBC Networks Product presentation
KBC Networks Product presentationKBC Networks Product presentation
KBC Networks Product presentation
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
 
Network data
Network dataNetwork data
Network data
 
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp011ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
 
2 roberto - mining - presentation-v3
2   roberto  - mining - presentation-v32   roberto  - mining - presentation-v3
2 roberto - mining - presentation-v3
 
Interoperabilty And Conformance Testing
 Interoperabilty And Conformance Testing Interoperabilty And Conformance Testing
Interoperabilty And Conformance Testing
 
Tns data center presentation
Tns data center presentationTns data center presentation
Tns data center presentation
 
Managed HD Video Conferencing
Managed HD Video ConferencingManaged HD Video Conferencing
Managed HD Video Conferencing
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPE
 
Chapter1 rev1.0
Chapter1   rev1.0Chapter1   rev1.0
Chapter1 rev1.0
 
Presentation file
Presentation filePresentation file
Presentation file
 
Presentation file
Presentation filePresentation file
Presentation file
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
Tw 22501b Managed Ipvpn.
Tw 22501b Managed Ipvpn.Tw 22501b Managed Ipvpn.
Tw 22501b Managed Ipvpn.
 

More from Niit Care (20)

Ajs 4 b
Ajs 4 bAjs 4 b
Ajs 4 b
 
Ajs 4 a
Ajs 4 aAjs 4 a
Ajs 4 a
 
Ajs 4 c
Ajs 4 cAjs 4 c
Ajs 4 c
 
Ajs 3 b
Ajs 3 bAjs 3 b
Ajs 3 b
 
Ajs 3 a
Ajs 3 aAjs 3 a
Ajs 3 a
 
Ajs 3 c
Ajs 3 cAjs 3 c
Ajs 3 c
 
Ajs 2 b
Ajs 2 bAjs 2 b
Ajs 2 b
 
Ajs 2 a
Ajs 2 aAjs 2 a
Ajs 2 a
 
Ajs 2 c
Ajs 2 cAjs 2 c
Ajs 2 c
 
Ajs 1 a
Ajs 1 aAjs 1 a
Ajs 1 a
 
Ajs 1 c
Ajs 1 cAjs 1 c
Ajs 1 c
 
Dacj 4 2-c
Dacj 4 2-cDacj 4 2-c
Dacj 4 2-c
 
Dacj 4 2-b
Dacj 4 2-bDacj 4 2-b
Dacj 4 2-b
 
Dacj 4 2-a
Dacj 4 2-aDacj 4 2-a
Dacj 4 2-a
 
Dacj 4 1-c
Dacj 4 1-cDacj 4 1-c
Dacj 4 1-c
 
Dacj 4 1-b
Dacj 4 1-bDacj 4 1-b
Dacj 4 1-b
 
Dacj 4 1-a
Dacj 4 1-aDacj 4 1-a
Dacj 4 1-a
 
Dacj 1-2 b
Dacj 1-2 bDacj 1-2 b
Dacj 1-2 b
 
Dacj 1-3 c
Dacj 1-3 cDacj 1-3 c
Dacj 1-3 c
 
Dacj 1-3 a
Dacj 1-3 aDacj 1-3 a
Dacj 1-3 a
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Comp tia n+_session_08

  • 1. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Objectives In this session, you will learn to: Identify the major WAN switching technologies. Identify the major transmission technologies for WANs. Identify the major WAN connectivity methods. Identify major Voice over Data systems. Identify the major categories of network threats. Identify the elements of a virus protection plan. Identify the components of local network security. Ver. 1.0 Session 8 Slide 1 of 60
  • 2. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security WAN Switching Technologies In Wide Area Network (WAN) data can move using a number of different switching techniques, such as: Circuit Switching Networks Virtual Circuits Packet Switching Networks Cell Switching Networks These switching methods can have a great effect on network characteristics such as performance and reliability. Ver. 1.0 Session 8 Slide 2 of 60
  • 3. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Circuit Switching Networks • In circuit switching networks, a single path from one endpoint to another is built when a connection is needed. Modem Modem Path built when circuit is established Ver. 1.0 Session 8 Slide 3 of 60
  • 4. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Virtual Circuits • Virtual circuits are a routing technique that connects endpoints logically through a provider’s network. Logical connections Permanent virtual circuits: Switched virtual circuits: Provider Provider network always on network connects when needed Ver. 1.0 Session 8 Slide 4 of 60
  • 5. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Packet Switching Networks • Packet switching networks move data through the network packet by packet. • Each packet takes the best route available at any given time rather than following an established circuit. 1 2 3 Each packet finds its own route Ver. 1.0 Session 8 Slide 5 of 60
  • 6. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Cell Switching Networks • Cell switching networks data is divided into fixed-length cells instead of variable-length packets. • The advantage of cell switching over packet switching is its predictability. Ver. 1.0 Session 8 Slide 6 of 60
  • 7. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security WAN Transmission Technologies Transmission technologies are another component of a WAN implementation. The transmission method of WAN affects overall network performance. Ver. 1.0 Session 8 Slide 7 of 60
  • 8. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Dial-Up Connections • Dial-up lines are local loop Public Switched Telephone Network (PSTN) that: Use modems Use Existing phone lines Provide Low-bandwidth WAN connectivity Provide Remote network access PSTN Ver. 1.0 Session 8 Slide 8 of 60
  • 9. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Dedicated and Leased Data Lines • Dedicated lines and leased lines provide a dedicated connection between two endpoints. • These are lines are used by companies to provide a high- quality connection between two locations. Telco network Leased data lines Ver. 1.0 Session 8 Slide 9 of 60
  • 10. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Integrated Services Digital Network (ISDN) • ISDN is a digital circuit switching technology that carries both voice and data over digital phone lines or PSTN wires. Subscriber Telco Packet data network Switched data network Private line network ISDN adapter ISDN switch Ver. 1.0 Session 8 Slide 10 of 60
  • 11. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Cable Access • Cable Internet access uses a cable television connection and a cable modem to provide high-speed Internet access to homes and small businesses. Cable modem ISP TV signal Cable TV feed Ver. 1.0 Session 8 Slide 11 of 60
  • 12. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Digital Subscriber Line (DSL) • DSL is a broadband Internet connection method that transmits digital signals over existing phone lines. Customer Telco Local loop phone line Voice PSTN Multiplexer DSL modem Digital Ver. 1.0 Session 8 Slide 12 of 60
  • 13. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security X.25 Switched Networks • X.25 is a legacy packet switching network technology to move data across the less-than-reliable long-distance public carriers available at that time. Customer network Data Terminal Equipment (DTE) X.25 backbone Data Circuit Equipment (DCE) Packet Switching Equipment (PSE) Ver. 1.0 Session 8 Slide 13 of 60
  • 14. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Frame Relay • Frame relay is a packet switching implementation first offered in 1992 by AT&T and Sprint as a more efficient alternative to X.25. It was originally developed to support PRI-ISDN networks. Customer network Clean carrier networks DTE Less error checking required DCE Frame Relay Bearer Services (FRBS) Ver. 1.0 Session 8 Slide 14 of 60
  • 15. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Asynchronous Transfer Mode (ATM) • Asynchronous Transfer Mode (ATM) is a versatile, cell switching network technology designed for deployment in LANs, WANs, and telephone networks. Private ATM LAN Public ATM network Data Voice ATM switch Video Endpoints Ver. 1.0 Session 8 Slide 15 of 60
  • 16. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security T-Carrier Systems • The T-Carrier system was designed to carry multiplexed telephone connections. T1 and T3 are the two most common T-service levels. T-Carrier circuit T1: 24 channels T3: 672 channels Ver. 1.0 Session 8 Slide 16 of 60
  • 17. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Synchronous Optical Network (SONET) • SONET is a standard with the following features: Synchronous data transport over fiber optic cable Excellent bandwidth Built-in fault recovery Speeds up to 2.48 GBps Optical Carrier (OC) and Synchronous Transport Signal (STS) specifications Self-healing dual-fiber ring Ver. 1.0 Session 8 Slide 17 of 60
  • 18. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security SONET Network Components A SONET network is divided into three areas: Broadband backbone network Regional network Collector ring Routes between regional networks Broadband backbone network Broadband backbone network Joins multiple collector rings Integrated management Regional network DCS to place customer’s signal on ring Collector ring LAN Ver. 1.0 Session 8 Slide 18 of 60
  • 19. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Unbounded WAN Media • Unbounded media such as satellite linkups are employed for truly long-range WAN transmission. T1 T1 LAN LAN Ver. 1.0 Session 8 Slide 19 of 60
  • 20. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Activity 10-2 Activity on Installing a Modem Ver. 1.0 Session 8 Slide 20 of 60
  • 21. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Activity 10-3 Activity on Creating a Dial-Up Connection Ver. 1.0 Session 8 Slide 21 of 60
  • 22. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security WAN Connectivity Methods WAN connectivity methods help transmit WAN data. The various WAN connectivity methods are: Multiplexers in WAN Connectivity Channel Service Unit/Data Service Unit (CSU/DSU) Telephone Modem Standards Internet Connection Sharing (ICS) Ver. 1.0 Session 8 Slide 22 of 60
  • 23. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Multiplexers in WAN Connectivity • A multiplexer (mux) is used to combine multiple data signals onto WAN transmission media. LAN T-1 LAN T-1 mux ISP PBX Ver. 1.0 Session 8 Slide 23 of 60
  • 24. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Channel Service Unit/Data Service Unit (CSU/DSU) • CSU/DSU is a combination of two WAN connectivity devices that work together to terminate the ends of a digital T1 or T3 line from a telephone company network. LAN Router (DTE) DSU Telco network CSU Ver. 1.0 Session 8 Slide 24 of 60
  • 25. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Telephone Modem Standards • Current modem standards known as V Dot Standards are set by the International Telecommunications Union (ITU). • The following table lists some of the most common standards: ITU Standard Speed V.32 9,600 bps synchronous; 4,800 bps asynchronous V.32 bis 14.4 Kbps synchronous and asynchronous V.34 28.8 Kbps V.34 bis 33.6 Kbps V.42 57.6 Kbps; specifies standards for error checking V.42 bis 57.6 Kbps; specifies standards for compression V.90 56 Kbps upstream; 33.6 Kbps downstream because downstream data is modulated Ver. 1.0 Session 8 Slide 25 of 60
  • 26. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Internet Connection Sharing (ICS) • ICS is a WAN connectivity method for Windows computer systems that connects multiple computers to the Internet by using a single Internet connection. ICS host ISP Ver. 1.0 Session 8 Slide 26 of 60
  • 27. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Activity 10-4 Activity on Examining ICS Configuration on Windows Server 2003 Ver. 1.0 Session 8 Slide 27 of 60
  • 28. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Voice Over Data Systems • Voice over Data systems are communications systems that transmit analog voice communications over digital WAN networking technologies. PBX Voice agent LAN Voice agent Voice agent Fax Machine Voice agent PC with dial out Ver. 1.0 Session 8 Slide 28 of 60
  • 29. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Voice Over IP ( VoIP) • VoIP is a Voice over Data implementation in which voice signals are transmitted over IP networks. PBX VoIP Interface VoIP-compatible fax machine Ver. 1.0 Session 8 Slide 29 of 60
  • 30. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Network Threats Network security can be obtained by protecting the network from network threats. The different types of network threats that can affect the network are: Unauthorized Access Data Theft Password Attacks Brute Force Password Attacks Trojan Horse Attacks Data Protection Methods Ver. 1.0 Session 8 Slide 30 of 60
  • 31. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Network Threats (Contd.) The Spoofing Process Session Hijacking Attacks Man-in-the-Middle Attacks Denial of Service (DoS) Attacks Distributed Denial of Service (DDoS) Attacks Viruses Social Engineering Attacks Data Protection Methods Ver. 1.0 Session 8 Slide 31 of 60
  • 32. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Unauthorized Access • Unauthorized access is any type of network or data access that is not explicitly approved by the organization. Attacker Deliberate attack by outsider Intentional or unintentional misuse Ver. 1.0 Session 8 Slide 32 of 60
  • 33. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Data Theft • Data theft is a type of attack in which unauthorized access is used to obtain protected network information. Files on server Data in transit Attacker Ver. 1.0 Session 8 Slide 33 of 60
  • 34. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Password Attacks • A password attack is any type of unauthorized effort to discover a user’s valid password. User01 Attacker easy password Steal or guess password Ver. 1.0 Session 8 Slide 34 of 60
  • 35. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Brute Force Password Attacks • A brute force password attack is a method of guessing passwords by using software that systematically generates password combinations until a valid one is found. xxxxxxxxx xPxxxxxxx xPassxxxx xPass1234 !Pass1234 User Attacker Ver. 1.0 Session 8 Slide 35 of 60
  • 36. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Trojan Horse Attacks • A Trojan horse attack is an attempt to gain unauthorized access through the use of a Trojan horse program, which masquerades as valid software. Program performs unauthorized functions Attacker Attacker sends valid- looking program Ver. 1.0 Session 8 Slide 36 of 60
  • 37. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Spoofing Attacks • A spoofing attack is a type of attack in which a device outside the network uses an internal network address to masquerade as a device inside the network. Real IP address: 10.10.10.25 Source IP address: 192.168.0.10 Destination IP address: 192.168.0.77 IP Packet Attacker Target 192.168.0.77 Ver. 1.0 Session 8 Slide 37 of 60
  • 38. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security The Spoofing Process • Spoofing process consists of following steps: 1. Identify target 2. Identify trusted host 3. Disable trusted host 4. Steal trusted host’s identity 5. Redirect data from target Real IP address: 10.10.10.25 2 Source IP address: 192.168.0.10 Destination IP address: 192.168.0.77 3 4 Trusted host 192.168.0.10 IP Packet Attacker 5 1 Target 192.168.0.77 Ver. 1.0 Session 8 Slide 38 of 60
  • 39. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Session Hijacking Attacks • Session hijacking is a type of spoofing in which the attacker takes over an existing network communication session between two devices after the session has already been authenticated. Client Attacker Server Ver. 1.0 Session 8 Slide 39 of 60
  • 40. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Man-in-the-Middle Attacks • A man-in-the-middle attack is a data-theft technique in which the attacker interposes a device between two legitimate hosts to gain access to their data transmissions. Server Client Attacker Ver. 1.0 Session 8 Slide 40 of 60
  • 41. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Denial of Service (DoS) Attacks • DoS attack is an attack that is mounted for the purpose of disabling systems that provide network services, rather than to steal data or inflict damage. Ping Ping Ping Ping Attacker Ver. 1.0 Session 8 Slide 41 of 60
  • 42. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Distributed Denial of Service (DDoS) Attacks • DDoS attack is a type of DoS attack that uses multiple computers on disparate networks to launch the attack from many simultaneous sources. Ping Ping Ping Ping Attacker Ping Ping Drones Ver. 1.0 Session 8 Slide 42 of 60
  • 43. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Viruses • A virus is a self-propagating unauthorized software program. • Virus attacks do not have a specific target or goal. Attacker Ver. 1.0 Session 8 Slide 43 of 60
  • 44. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Social Engineering Attacks • A social engineering attack is a non-technical attack in which the attacker attempts to obtain information directly from network users by employing deception and trickery. 1 User name Password 2 Attacker Target Ver. 1.0 Session 8 Slide 44 of 60
  • 45. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Data Protection Methods To protect the data on your network, you need to: Monitor for unauthorized software. Limit physical access to network. Require strong passwords. Employ strong authentication and encryption on stored data. Use multiple forms of authentication between devices. Encrypt data during transmission. Conceal network address information. Train users to recognize and deter social engineering attacks. Ver. 1.0 Session 8 Slide 45 of 60
  • 46. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Virus Infection Methods Virus are the most common network threats, so a good defense plan is necessary of securing the network Virus can propagate through the following methods: Attaching to media Attaching to file Attach to media Attaching to email Attach to file Attach to email Ver. 1.0 Session 8 Slide 46 of 60
  • 47. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Virus Types Types of Viruses are: Boot sector: Writes itself into the boot sector of a floppy disk File infecting: Infects executable programs and uses OS resources to propagate itself Macro: Uses other programs macro engines to propagate or dump its payload Mailer and mass mailer: Sends itself to other users using e- mail systems Polymorphic: Changes as it moves around Script: Runs code using the Windows scripting host Stealth: Moves and attempts to conceal itself until it propagates Worm: Detects connections and establishes communication with other devices on its own Ver. 1.0 Session 8 Slide 47 of 60
  • 48. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Antivirus Software • Antivirus software is an application that scans files for executable code that matches patterns, known as signatures or definitions. Antivirus perimeter Antivirus deployed at clients Ver. 1.0 Session 8 Slide 48 of 60
  • 49. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Updating Virus Definitions Antivirus software vendors maintain and update the libraries of virus definitions Customers must periodically update the definitions on all systems where the software is installed. Antivirus Antivirus software vendor server Antivirus clients Ver. 1.0 Session 8 Slide 49 of 60
  • 50. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Internet Email Virus Protection • Internet email is a source of serious virus threats. • Internet email virus protection by deploying antivirus: On mail connector On Internet gateway At desktop Antivirus deployed on mail connector Antivirus deployed on Internet gateway Antivirus deployed at desktop Ver. 1.0 Session 8 Slide 50 of 60
  • 51. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Local Security Security is implemented in a local network using a security plan. To ensure security for its users, systems, and data, security measures are implemented on different levels and on different components of the network. Ver. 1.0 Session 8 Slide 51 of 60
  • 52. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Share-Level and User-Level Security Two primary models for implementing security in local area network are: Share-level security User-level security User logs on Password1 Authentication Password2 User gets access token server Password3 User presents token to access resources Resource server Share level User level Ver. 1.0 Session 8 Slide 52 of 60
  • 53. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Rights • A right is a security setting that controls whether or not a user can perform a system wide function such as shutting down a computer or logging on to a server. Shut down the system Log on locally User01 Change system time Ver. 1.0 Session 8 Slide 53 of 60
  • 54. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Permissions • A permission is a security setting that determines the level of access a user or group account has to a particular resource. Administrators: Full access User01: Read-only access Marketing documents Contractors: No access Ver. 1.0 Session 8 Slide 54 of 60
  • 55. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security The NTFS File System NTFS File system provides five-levels of security to the drives. NTFS permissions can be applied either to folders or to individual files. NTFS Ver. 1.0 Session 8 Slide 55 of 60
  • 56. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Users and Groups Rights and permissions can be assigned to individual user accounts or to group of users. Combine into group Grant access to resources Users with similar security needs Ver. 1.0 Session 8 Slide 56 of 60
  • 57. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Effective Permissions • When a user is a member of multiple groups that each have permissions to a resource, the user’s total effective permission is the combination of all the separate permission assignments. Managers Write Access Read and Write Access User01 Sales Read Access Ver. 1.0 Session 8 Slide 57 of 60
  • 58. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Share and File System Permissions • When you share a folder for network use, you can assign a separate set of permissions to the shared folder. • The share permissions on Windows systems are Read, Change, and Full Control. Access on local computer: File system permissions apply Access through network: Share and file system permissions apply Ver. 1.0 Session 8 Slide 58 of 60
  • 59. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Activity 11-3 Activity on Implementing Local Security Ver. 1.0 Session 8 Slide 59 of 60
  • 60. CompTIA N+ Certification: Wide AreaUsing Attended Installation Installing Windows XP Professional Network (WAN) Infrastructure and Network Security Summary In this session, you learned that: In Wide Area Network (WAN), data can move using a number of different switching techniques. To implement WAN, different transmission technologies are used that affect the network performance. To transmit WAN, data WAN connectivity models are used. There are different categories of network threats that affect the security of the network. There are different type of data protection techniques used to protect the network from the network threats. The security in a local network can be implemented at different levels on different components of the network. Ver. 1.0 Session 8 Slide 60 of 60

Editor's Notes

  1. You need to tell about : 1 Permanent virtual circuits 2. Switched virtual circuits As given in page no. 320 of CG.
  2. You need to tell about: Dial-up hardware RJ-11 connectors Benefits and drawbacks of dial-up As given in page no. 323 of CG
  3. You need to tell that : Advantage of lease as given in page 323 of CG.
  4. You need to tell about: Channels ISDN Hardware As given in page no. 324 of CG.
  5. You need to tell about: Cable Connectivity Devices Cable Access Speeds As given in page no. 325 of CG.
  6. You need to tell about: DSL Connection Lines DSL Channels DSL Technologies DSL Connectivity Devices As given in page no 326 of CG
  7. You need to tell about: X.25 hardware as given in page no 327 of CG.
  8. You need to tell about: Provisioning a Frame Relay Connection as given in page no 328 of CG.
  9. You need to tell about : Features of ATM as given in page no.329 of CG ATM connections as given in page no. 330 of CG.
  10. To be discussed….
  11. To be discussed….
  12. You need to tell about: AppleTalk networks as given in Page no 264 in CG. Interoperability between Windows and AppleTalk as given in Page no 265 in CG.