SlideShare a Scribd company logo
Basic Security



              Networking for Home and Small Businesses – Chapter
              8




Version 4.0                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   1
Objectives
   Identify and describe the various networking threats.
   Identify different methods of attack.
   Describe security procedures and applications.
   Describe the features of a firewall and how it can be
    used to protect against an attack.




                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   2
Networking Threats
 Describe major risks of network intrusion




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   3
Networking Threats
 Define the sources of network intrusion.




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   4
Networking Threats
 Describe social engineering and phishing




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   5
Methods of Attack
 Describe viruses, worms, and Trojan horses.




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   6
Methods of Attack
 Denial of Service and Brute Force attacks




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   7
Methods of Attack
 Describe spyware, tracking cookies, adware and pop-
  ups.




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   8
Methods of Attack
 Describe Spam




                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   9
Security Procedures and Applications
 Defining a security policy




                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   10
Security Procedures and Applications
 Define common security procedures




                          © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   11
Security Procedures and Applications
 Describe how updates and patches relate to security
  issues.




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   12
Security Procedures and Applications
 Anti-virus software




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   13
Security Procedures and Applications
 SPAM prevention




                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   14
Security Procedures and Applications
 Anti-Spyware




                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   15
Firewall Features and How to Use them to
Protect Against an Attack
 What is a firewall?




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   16
Firewall Features and How to Use them to
Protect Against an Attack
 Using a Firewall to Protect Against an Attack




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   17
Firewall Features and How to Use them to
Protect Against an Attack
 Vulnerability Analysis




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   18
Firewall Features and How to Use them to
Protect Against an Attack
 Security Best Practices




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   19
Summary
 Networks can be open to intrusion through
  vulnerabilities in software, hardware attacks, or the
  weaknesses of individuals.
 Effective network security is based on a variety of
  products and services, combined with a thorough
  security policy.
 A firewall controls traffic between networks and helps
  prevent unauthorized access.




                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   20
© 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   21

More Related Content

PPT
CCNA Discovery 1 - Chapter 9
PPT
CCNA Discovery 2 - Chapter 1
PPT
CCNA Discovery 2 - Chapter 2
PPT
CCNA Discovery 1 - Chapter 7
PPT
CCNA Discovery 1 - Chapter 2
PPT
CCNA Discovery 1 - Chapter 5
PPT
CCNA Discovery 2 - Chapter 8
PPT
CCNA Discovery 2 - Chapter 3
CCNA Discovery 1 - Chapter 9
CCNA Discovery 2 - Chapter 1
CCNA Discovery 2 - Chapter 2
CCNA Discovery 1 - Chapter 7
CCNA Discovery 1 - Chapter 2
CCNA Discovery 1 - Chapter 5
CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 3

What's hot (20)

PPT
CCNA Discovery 1 - Chapter 4
PPT
CCNA Discovery 1 - Chapter 3
PPT
CCNA Discovery 1 - Chapter 6
PPT
Chapter 1 overview
PPT
Discovery smb isp_chapter1
PPT
Exploration network chapter1
PPT
CCNA Discovery 3 - Chapter 1
PPTX
CCNA RS_NB - Chapter 1
PPT
CCNA Discovery 1 - Chapter 1
PPTX
Exploration network chapter1
PPT
Network Fundamentals – Chapter 1
PPT
CCNA Icnd110 s00
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 1
PPT
CCNA Icnd110 s01l02
PPT
Exploration network chapter1
PPT
Exploration network
PPTX
CCNA RS_ITN - Chapter 4
PDF
ccna1 v5 cap2
PPTX
CCNA RS_NB - Chapter 8
PDF
IPsec
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 6
Chapter 1 overview
Discovery smb isp_chapter1
Exploration network chapter1
CCNA Discovery 3 - Chapter 1
CCNA RS_NB - Chapter 1
CCNA Discovery 1 - Chapter 1
Exploration network chapter1
Network Fundamentals – Chapter 1
CCNA Icnd110 s00
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA Icnd110 s01l02
Exploration network chapter1
Exploration network
CCNA RS_ITN - Chapter 4
ccna1 v5 cap2
CCNA RS_NB - Chapter 8
IPsec
Ad

Viewers also liked (9)

PPT
CCNA Discovery 2 - Chapter 7
PPT
CCNA Discovery 2 - Chapter 4
PPT
CCNA Discovery 2 - Chapter 9
PPT
CCNA Discovery 2 - Chapter 6
PPT
CCNA Discovery 2 - Chapter 5
PPT
CCNA Discovery 4 - Chapter 1
PDF
CCNAv5 - S4: Chapter3 Point to-point Connections
PDF
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
PPTX
VMware vShield - Overview
CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 6
CCNA Discovery 2 - Chapter 5
CCNA Discovery 4 - Chapter 1
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
VMware vShield - Overview
Ad

Similar to CCNA Discovery 1 - Chapter 8 (20)

PDF
It nv51 instructor_ppt_ch11
PPTX
Ccna sv2 instructor_ppt_ch6
PPT
CCNA Exploration 4 - Chapter 4
PPTX
Ccna sv2 instructor_ppt_ch1
PDF
It nv51 instructor_ppt_ch1
PPT
IT Essentials Chapter 9
PDF
ITN6_Instructor_Materials_Chapter11.pdf
PPT
ITE v5.0 - Chapter 10
PPT
CCNA Security 02- fundamentals of network security
PPTX
CCNA RS_ITN - Chapter 11
PPTX
CCNA RS_NB - Chapter 11
PPT
Ccna+sec+ch01+ +overview+security
DOCX
Ccna security comparison
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 11
PPT
CCNA Exploration 3 - Chapter 7
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
PDF
SMB Network Security Checklist
PPTX
BYOD without Compromise
PPTX
Ccna sv2 instructor_ppt_ch8
It nv51 instructor_ppt_ch11
Ccna sv2 instructor_ppt_ch6
CCNA Exploration 4 - Chapter 4
Ccna sv2 instructor_ppt_ch1
It nv51 instructor_ppt_ch1
IT Essentials Chapter 9
ITN6_Instructor_Materials_Chapter11.pdf
ITE v5.0 - Chapter 10
CCNA Security 02- fundamentals of network security
CCNA RS_ITN - Chapter 11
CCNA RS_NB - Chapter 11
Ccna+sec+ch01+ +overview+security
Ccna security comparison
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA Exploration 3 - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
SMB Network Security Checklist
BYOD without Compromise
Ccna sv2 instructor_ppt_ch8

More from Irsandi Hasan (20)

PPTX
CCNA v6.0 ITN - Chapter 11
PPTX
CCNA v6.0 ITN - Chapter 10
PPTX
CCNA v6.0 ITN - Chapter 09
PPTX
CCNA v6.0 ITN - Chapter 08
PPTX
CCNA v6.0 ITN - Chapter 07
PPTX
CCNA v6.0 ITN - Chapter 06
PPTX
CCNA v6.0 ITN - Chapter 05
PPTX
CCNA v6.0 ITN - Chapter 04
PPTX
CCNA v6.0 ITN - Chapter 03
PPTX
CCNA v6.0 ITN - Chapter 02
PPTX
CCNA v6.0 ITN - Chapter 01
PPTX
CCNA RS_NB - Chapter 10
PPTX
CCNA RS_NB - Chapter 9
PPTX
CCNA RS_NB - Chapter 7
PPTX
CCNA RS_NB - Chapter 6
PPTX
CCNA RS_NB - Chapter 5
PPTX
CCNA RS_NB - Chapter 4
PPTX
CCNA RS_NB - Chapter 3
PPTX
CCNA RS_NB - Chapter 2
PPTX
CCNA RS_ITN - Chapter 10
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 01
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 2
CCNA RS_ITN - Chapter 10

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
KodekX | Application Modernization Development
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
Teaching material agriculture food technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation theory and applications.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The AUB Centre for AI in Media Proposal.docx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Chapter 3 Spatial Domain Image Processing.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MYSQL Presentation for SQL database connectivity
Reach Out and Touch Someone: Haptics and Empathic Computing
CIFDAQ's Market Insight: SEC Turns Pro Crypto
KodekX | Application Modernization Development
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
Teaching material agriculture food technology
Unlocking AI with Model Context Protocol (MCP)
20250228 LYD VKU AI Blended-Learning.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

CCNA Discovery 1 - Chapter 8

  • 1. Basic Security Networking for Home and Small Businesses – Chapter 8 Version 4.0 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives  Identify and describe the various networking threats.  Identify different methods of attack.  Describe security procedures and applications.  Describe the features of a firewall and how it can be used to protect against an attack. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Networking Threats  Describe major risks of network intrusion © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Networking Threats  Define the sources of network intrusion. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Networking Threats  Describe social engineering and phishing © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Methods of Attack  Describe viruses, worms, and Trojan horses. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Methods of Attack  Denial of Service and Brute Force attacks © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Methods of Attack  Describe spyware, tracking cookies, adware and pop- ups. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Methods of Attack  Describe Spam © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Security Procedures and Applications  Defining a security policy © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Security Procedures and Applications  Define common security procedures © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Security Procedures and Applications  Describe how updates and patches relate to security issues. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Security Procedures and Applications  Anti-virus software © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Security Procedures and Applications  SPAM prevention © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Security Procedures and Applications  Anti-Spyware © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Firewall Features and How to Use them to Protect Against an Attack  What is a firewall? © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Firewall Features and How to Use them to Protect Against an Attack  Using a Firewall to Protect Against an Attack © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Firewall Features and How to Use them to Protect Against an Attack  Vulnerability Analysis © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Firewall Features and How to Use them to Protect Against an Attack  Security Best Practices © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Summary  Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals.  Effective network security is based on a variety of products and services, combined with a thorough security policy.  A firewall controls traffic between networks and helps prevent unauthorized access. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21