SlideShare uma empresa Scribd logo
1 de 17
IT Essentials PC Hardware
  and Software 4.1

  Instructional Resource
  Chapter 9: Fundamental
  Security




Presentation_ID               © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Chapter 9: Objectives
            Explain why security is important.
            Describe security threats.
            Identify security procedures.
            Identify common preventive maintenance techniques for security.
            Troubleshoot security.




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
Chapter 9: Critical Concepts
            What is this chapter about and why is it important?
            This chapter details security concepts including security threats, security policy
             components, security implementation, preventive procedures, and common security
             problems.
            Security is a vital part of computing and networking. IP version 4 was not meant as a
             secure protocol. It was developed to share information across a network
             environment. Because of maliciousness and business involvement, pop-ups,
             viruses, invasion of privacy, and spyware have evolved. According to a business
             advisory council, security must be taught in all classes in all aspects of computing.
             Every person involved with a computer must be made aware of security threats and
             measures that can be used to protect data and computerized equipment.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
Chapter 9: Activities
            What activities are associated with this chapter?
                  9.1 Worksheet: Security Attacks
                  9.2.1 Worksheet: Third-Party Anti-Virus Software
                  9.3.4 Packet Tracer Activity: Connecting Wireless PCs to a Linksys WRT300N
                  9.4.2 Worksheet: Operating System Updates
                  9.5.2 Worksheet: Gather Information from the Customer
                  Chapter 9 Quiz




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
Chapter 9: New Terms
            What terms are introduced in this chapter?



                  ActiveX                                                                   9.2.2

                  adware                                                                    9.2.3

                  biometric device                                                          9.3.3

                  card key                                                                  9.3.2

                  Denial of Service (DoS)                                                   9.2.4

                  Distributed Denial of Service (DDoS)                                      9.2.7

                  DNS poisoning                                                             9.2.7

                  encryption                                                                9.3.3

                  grayware                                                                  9.2.3

                  Java                                                                      9.2.2




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   5
Chapter 9: New Terms (continued)
            What terms are introduced in this chapter?



                  JavaScript                                                                                 9.2.2

                  Lightweight Extensible Authentication Protocol (LEAP)                                      9.3.4

                  malware                                                                                    9.2.3

                  man-in-the-middle                                                                          9.2.7

                  phishing                                                                                   9.2.3

                  replay attack                                                                              9.2.7

                  Service Set Identifier (SSID)                                                              9.3.4

                  social engineering                                                                         9.2.6

                  spam                                                                                       9.2.5

                  spoof                                                                                      9.2.7




Presentation_ID                                                           © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
Chapter 9: New Terms (continued)
            What terms are introduced in this chapter?



                  SYN flood                                                                     9.2.7

                  Trojan threat                                                                 9.2.1

                  virus                                                                         9.2.1

                  Wi-Fi Protected Access (WPA)                                                  9.3.4

                  Wi-Fi Protected Access 2 (WPA2)                                               9.3.4

                  Wired Equivalent Privacy (WEP)                                                9.3.4

                  wireless network                                                              9.3.4

                  Wireless Transport Layer Security (WTLS)                                      9.3.4

                  worm                                                                          9.2.1

                  zombie                                                                        9.2.4




Presentation_ID                                              © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   7
Chapter 9: Changes
            What has changed from the previous version (4.0) of ITEPC?
                  Page 9.2.8 Explain data wiping, hard drive destruction, and recycling
                  • Data wiping


                  Page 9.3.1 Explain what is required in a basic local security policy
                  • Compliance
                  • Classification


                  Page 9.3.2 Explain the tasks required to protect physical equipment
                  • Intrusion detection
                  • Trusted Platform Module (TPM)




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
Chapter 9: Changes (continued)
           What has changed from the previous version (4.0) of ITEPC?
             Page 9.3.3 Describe ways to protect data
             • Data Encryption
             • Software Firewall
             • Data Backups
             • Smart Card Security
             • Biometric Security
             • File System Security

                  Page 9.3.4 Describe wireless security techniques
                  • SSID
                  • MAC Filtering
                  • WEP
                  • WPA
                  • WPA2
                  • LEAP


Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
Chapter 9: Changes (continued)
           What has changed from the previous version (4.0) of ITEPC?
                  Page 9.5.1 Review the troubleshooting process
                  • Identify the Problem
                  • Establish a Theory of Probable Causes
                  • Determine an Exact Cause
                  • Implement a Solution
                  • Verify Solution and Full System Functionality
                  • Document Findings




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
Chapter 9: Classroom Management
            Wireless is a great way to teach security. Authentication and encryption can be
             applied one at a time, and then have students access the wireless network by
             applying the appropriate credentials.
            Search the Internet for current virus and malware attacks and any trends in attacks.
            Access Microsoft TechNet Security bulletins to see specific problems and
             vulnerabilities in any particular operating system.
            Students can wipe old hard drives with lower capacities to prepare them for
             donation. Some hard drive companies have data wiping software that can be
             demonstrated during this section.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
Chapter 9: Teaching Analogies
            A computer is like a bank that has gold stored in it. When this bank was built, it did
             not have a vault or locks on the windows and doors. The bank is very susceptible to
             theft in this condition. Over time, the bank builders have learned how to lock the
             doors, build a vault, and guard the bank. The operating system patches and design
             changes that have been made to safeguard the computer are like the lockable
             doors on the bank. The anti-virus and other software that scans for spyware and
             malware are like the vault that protects the gold. The firewall that protects the
             computer is like the professionals who guard the bank.




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   12
Chapter 9: Suggested Class Discussion
                 What is an application vendor’s responsibility when security holes are found in the
                  vendor’s product?
                 What are the penalties for software piracy?
                   • Access the Business Software Alliance web site to see how to report piracy
                      anonymously.
                 What free anti-virus, anti-spam, and anti-spyware tools are available?
                 How can firewalls help to block viruses, spam, and spyware?
                 How do music and video piracy relate to computer security issues?
                 What is war driving? Is it legal?




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   13
Chapter 9: Best Practices

                 Have the students determine how many wireless networks are present in their
                  neighborhood.
                 Use the Internet to research legislation and fines that are related to computer
                  hacking with the words: lawsuits fines computer hacking.




Presentation_ID                                           © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14
Chapter 9: Outside Reading
                 National Security Agency
                  http://www.nsa.gov/

                 Verisign
                  http://www.verisign.com/




Presentation_ID                              © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   15
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   16
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   17

Mais conteúdo relacionado

Mais procurados

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
End2end resilience
End2end resilienceEnd2end resilience
End2end resilience
muhammadz24
 

Mais procurados (6)

Skyjacking A Cisco WLAN - What it means and how to protect against it?
Skyjacking A Cisco WLAN - What it means and how to protect against it?Skyjacking A Cisco WLAN - What it means and how to protect against it?
Skyjacking A Cisco WLAN - What it means and how to protect against it?
 
Collaborative Contingency in the Cloud
Collaborative Contingency in the CloudCollaborative Contingency in the Cloud
Collaborative Contingency in the Cloud
 
Isday 2017 - Atelier Cisco
Isday 2017 - Atelier CiscoIsday 2017 - Atelier Cisco
Isday 2017 - Atelier Cisco
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
End2end resilience
End2end resilienceEnd2end resilience
End2end resilience
 

Destaque

CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
Irsandi Hasan
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
Irsandi Hasan
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
Irsandi Hasan
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
Irsandi Hasan
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
Irsandi Hasan
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
Irsandi Hasan
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
Irsandi Hasan
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
Irsandi Hasan
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
Irsandi Hasan
 

Destaque (20)

CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
ITE - Chapter 7
ITE - Chapter 7ITE - Chapter 7
ITE - Chapter 7
 

Semelhante a ITE - Chapter 9

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Dhaval Dave
 
VxWorks - Holistic Security (Art of Testing)
VxWorks - Holistic Security (Art of  Testing)VxWorks - Holistic Security (Art of  Testing)
VxWorks - Holistic Security (Art of Testing)
Aditya K Sood
 
Smartphone Challenge: Guidelines for development of network friendly applicat...
Smartphone Challenge: Guidelines for development of network friendly applicat...Smartphone Challenge: Guidelines for development of network friendly applicat...
Smartphone Challenge: Guidelines for development of network friendly applicat...
Daniel Appelquist
 
Finjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White PaperFinjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White Paper
Elliott Lowe
 
The Future of Direct Communications Technologies and Proximity-based Applicat...
The Future of Direct Communications Technologies and Proximity-based Applicat...The Future of Direct Communications Technologies and Proximity-based Applicat...
The Future of Direct Communications Technologies and Proximity-based Applicat...
ReportLinker.com
 
Study Wireless Security Deployment - PKL
Study Wireless Security Deployment  - PKLStudy Wireless Security Deployment  - PKL
Study Wireless Security Deployment - PKL
Aaron ND Sawmadal
 

Semelhante a ITE - Chapter 9 (20)

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Final taxo
Final taxoFinal taxo
Final taxo
 
Smart cloud - single to multi cloud
Smart cloud - single to multi cloud Smart cloud - single to multi cloud
Smart cloud - single to multi cloud
 
VxWorks - Holistic Security (Art of Testing)
VxWorks - Holistic Security (Art of  Testing)VxWorks - Holistic Security (Art of  Testing)
VxWorks - Holistic Security (Art of Testing)
 
Smartphone Challenge: Guidelines for development of network friendly applicat...
Smartphone Challenge: Guidelines for development of network friendly applicat...Smartphone Challenge: Guidelines for development of network friendly applicat...
Smartphone Challenge: Guidelines for development of network friendly applicat...
 
Table of contents
Table of contentsTable of contents
Table of contents
 
Finjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White PaperFinjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White Paper
 
Building Microservices with Micronaut: A Full-Stack JVM-Based Framework
Building Microservices with Micronaut:  A Full-Stack JVM-Based FrameworkBuilding Microservices with Micronaut:  A Full-Stack JVM-Based Framework
Building Microservices with Micronaut: A Full-Stack JVM-Based Framework
 
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
 
Building a chain of trust from the device to the cloud in 5G
Building a chain of trust from the device to the cloud in 5GBuilding a chain of trust from the device to the cloud in 5G
Building a chain of trust from the device to the cloud in 5G
 
ITE - Chapter 12
ITE - Chapter 12ITE - Chapter 12
ITE - Chapter 12
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
Dedicated Hosting
Dedicated HostingDedicated Hosting
Dedicated Hosting
 
The Future of Direct Communications Technologies and Proximity-based Applicat...
The Future of Direct Communications Technologies and Proximity-based Applicat...The Future of Direct Communications Technologies and Proximity-based Applicat...
The Future of Direct Communications Technologies and Proximity-based Applicat...
 
ITE - Chapter 8
ITE - Chapter 8ITE - Chapter 8
ITE - Chapter 8
 
Study Wireless Security Deployment - PKL
Study Wireless Security Deployment  - PKLStudy Wireless Security Deployment  - PKL
Study Wireless Security Deployment - PKL
 
Implementing Cisco Network Security Exam (210-260)
Implementing Cisco Network Security Exam (210-260)Implementing Cisco Network Security Exam (210-260)
Implementing Cisco Network Security Exam (210-260)
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 

Mais de Irsandi Hasan

Mais de Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

ITE - Chapter 9

  • 1. IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 9: Fundamental Security Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Chapter 9: Objectives  Explain why security is important.  Describe security threats.  Identify security procedures.  Identify common preventive maintenance techniques for security.  Troubleshoot security. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 9: Critical Concepts  What is this chapter about and why is it important?  This chapter details security concepts including security threats, security policy components, security implementation, preventive procedures, and common security problems.  Security is a vital part of computing and networking. IP version 4 was not meant as a secure protocol. It was developed to share information across a network environment. Because of maliciousness and business involvement, pop-ups, viruses, invasion of privacy, and spyware have evolved. According to a business advisory council, security must be taught in all classes in all aspects of computing. Every person involved with a computer must be made aware of security threats and measures that can be used to protect data and computerized equipment. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Chapter 9: Activities  What activities are associated with this chapter? 9.1 Worksheet: Security Attacks 9.2.1 Worksheet: Third-Party Anti-Virus Software 9.3.4 Packet Tracer Activity: Connecting Wireless PCs to a Linksys WRT300N 9.4.2 Worksheet: Operating System Updates 9.5.2 Worksheet: Gather Information from the Customer Chapter 9 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Chapter 9: New Terms  What terms are introduced in this chapter? ActiveX 9.2.2 adware 9.2.3 biometric device 9.3.3 card key 9.3.2 Denial of Service (DoS) 9.2.4 Distributed Denial of Service (DDoS) 9.2.7 DNS poisoning 9.2.7 encryption 9.3.3 grayware 9.2.3 Java 9.2.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Chapter 9: New Terms (continued)  What terms are introduced in this chapter? JavaScript 9.2.2 Lightweight Extensible Authentication Protocol (LEAP) 9.3.4 malware 9.2.3 man-in-the-middle 9.2.7 phishing 9.2.3 replay attack 9.2.7 Service Set Identifier (SSID) 9.3.4 social engineering 9.2.6 spam 9.2.5 spoof 9.2.7 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Chapter 9: New Terms (continued)  What terms are introduced in this chapter? SYN flood 9.2.7 Trojan threat 9.2.1 virus 9.2.1 Wi-Fi Protected Access (WPA) 9.3.4 Wi-Fi Protected Access 2 (WPA2) 9.3.4 Wired Equivalent Privacy (WEP) 9.3.4 wireless network 9.3.4 Wireless Transport Layer Security (WTLS) 9.3.4 worm 9.2.1 zombie 9.2.4 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Chapter 9: Changes  What has changed from the previous version (4.0) of ITEPC? Page 9.2.8 Explain data wiping, hard drive destruction, and recycling • Data wiping Page 9.3.1 Explain what is required in a basic local security policy • Compliance • Classification Page 9.3.2 Explain the tasks required to protect physical equipment • Intrusion detection • Trusted Platform Module (TPM) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Chapter 9: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 9.3.3 Describe ways to protect data • Data Encryption • Software Firewall • Data Backups • Smart Card Security • Biometric Security • File System Security Page 9.3.4 Describe wireless security techniques • SSID • MAC Filtering • WEP • WPA • WPA2 • LEAP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Chapter 9: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 9.5.1 Review the troubleshooting process • Identify the Problem • Establish a Theory of Probable Causes • Determine an Exact Cause • Implement a Solution • Verify Solution and Full System Functionality • Document Findings Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Chapter 9: Classroom Management  Wireless is a great way to teach security. Authentication and encryption can be applied one at a time, and then have students access the wireless network by applying the appropriate credentials.  Search the Internet for current virus and malware attacks and any trends in attacks.  Access Microsoft TechNet Security bulletins to see specific problems and vulnerabilities in any particular operating system.  Students can wipe old hard drives with lower capacities to prepare them for donation. Some hard drive companies have data wiping software that can be demonstrated during this section. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Chapter 9: Teaching Analogies  A computer is like a bank that has gold stored in it. When this bank was built, it did not have a vault or locks on the windows and doors. The bank is very susceptible to theft in this condition. Over time, the bank builders have learned how to lock the doors, build a vault, and guard the bank. The operating system patches and design changes that have been made to safeguard the computer are like the lockable doors on the bank. The anti-virus and other software that scans for spyware and malware are like the vault that protects the gold. The firewall that protects the computer is like the professionals who guard the bank. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Chapter 9: Suggested Class Discussion  What is an application vendor’s responsibility when security holes are found in the vendor’s product?  What are the penalties for software piracy? • Access the Business Software Alliance web site to see how to report piracy anonymously.  What free anti-virus, anti-spam, and anti-spyware tools are available?  How can firewalls help to block viruses, spam, and spyware?  How do music and video piracy relate to computer security issues?  What is war driving? Is it legal? Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Chapter 9: Best Practices  Have the students determine how many wireless networks are present in their neighborhood.  Use the Internet to research legislation and fines that are related to computer hacking with the words: lawsuits fines computer hacking. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Chapter 9: Outside Reading  National Security Agency http://www.nsa.gov/  Verisign http://www.verisign.com/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17