SlideShare a Scribd company logo
IT Essentials PC Hardware
  and Software 4.1

  Instructional Resource
  Chapter 9: Fundamental
  Security




Presentation_ID               © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Chapter 9: Objectives
            Explain why security is important.
            Describe security threats.
            Identify security procedures.
            Identify common preventive maintenance techniques for security.
            Troubleshoot security.




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
Chapter 9: Critical Concepts
            What is this chapter about and why is it important?
            This chapter details security concepts including security threats, security policy
             components, security implementation, preventive procedures, and common security
             problems.
            Security is a vital part of computing and networking. IP version 4 was not meant as a
             secure protocol. It was developed to share information across a network
             environment. Because of maliciousness and business involvement, pop-ups,
             viruses, invasion of privacy, and spyware have evolved. According to a business
             advisory council, security must be taught in all classes in all aspects of computing.
             Every person involved with a computer must be made aware of security threats and
             measures that can be used to protect data and computerized equipment.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
Chapter 9: Activities
            What activities are associated with this chapter?
                  9.1 Worksheet: Security Attacks
                  9.2.1 Worksheet: Third-Party Anti-Virus Software
                  9.3.4 Packet Tracer Activity: Connecting Wireless PCs to a Linksys WRT300N
                  9.4.2 Worksheet: Operating System Updates
                  9.5.2 Worksheet: Gather Information from the Customer
                  Chapter 9 Quiz




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
Chapter 9: New Terms
            What terms are introduced in this chapter?



                  ActiveX                                                                   9.2.2

                  adware                                                                    9.2.3

                  biometric device                                                          9.3.3

                  card key                                                                  9.3.2

                  Denial of Service (DoS)                                                   9.2.4

                  Distributed Denial of Service (DDoS)                                      9.2.7

                  DNS poisoning                                                             9.2.7

                  encryption                                                                9.3.3

                  grayware                                                                  9.2.3

                  Java                                                                      9.2.2




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   5
Chapter 9: New Terms (continued)
            What terms are introduced in this chapter?



                  JavaScript                                                                                 9.2.2

                  Lightweight Extensible Authentication Protocol (LEAP)                                      9.3.4

                  malware                                                                                    9.2.3

                  man-in-the-middle                                                                          9.2.7

                  phishing                                                                                   9.2.3

                  replay attack                                                                              9.2.7

                  Service Set Identifier (SSID)                                                              9.3.4

                  social engineering                                                                         9.2.6

                  spam                                                                                       9.2.5

                  spoof                                                                                      9.2.7




Presentation_ID                                                           © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
Chapter 9: New Terms (continued)
            What terms are introduced in this chapter?



                  SYN flood                                                                     9.2.7

                  Trojan threat                                                                 9.2.1

                  virus                                                                         9.2.1

                  Wi-Fi Protected Access (WPA)                                                  9.3.4

                  Wi-Fi Protected Access 2 (WPA2)                                               9.3.4

                  Wired Equivalent Privacy (WEP)                                                9.3.4

                  wireless network                                                              9.3.4

                  Wireless Transport Layer Security (WTLS)                                      9.3.4

                  worm                                                                          9.2.1

                  zombie                                                                        9.2.4




Presentation_ID                                              © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   7
Chapter 9: Changes
            What has changed from the previous version (4.0) of ITEPC?
                  Page 9.2.8 Explain data wiping, hard drive destruction, and recycling
                  • Data wiping


                  Page 9.3.1 Explain what is required in a basic local security policy
                  • Compliance
                  • Classification


                  Page 9.3.2 Explain the tasks required to protect physical equipment
                  • Intrusion detection
                  • Trusted Platform Module (TPM)




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
Chapter 9: Changes (continued)
           What has changed from the previous version (4.0) of ITEPC?
             Page 9.3.3 Describe ways to protect data
             • Data Encryption
             • Software Firewall
             • Data Backups
             • Smart Card Security
             • Biometric Security
             • File System Security

                  Page 9.3.4 Describe wireless security techniques
                  • SSID
                  • MAC Filtering
                  • WEP
                  • WPA
                  • WPA2
                  • LEAP


Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
Chapter 9: Changes (continued)
           What has changed from the previous version (4.0) of ITEPC?
                  Page 9.5.1 Review the troubleshooting process
                  • Identify the Problem
                  • Establish a Theory of Probable Causes
                  • Determine an Exact Cause
                  • Implement a Solution
                  • Verify Solution and Full System Functionality
                  • Document Findings




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
Chapter 9: Classroom Management
            Wireless is a great way to teach security. Authentication and encryption can be
             applied one at a time, and then have students access the wireless network by
             applying the appropriate credentials.
            Search the Internet for current virus and malware attacks and any trends in attacks.
            Access Microsoft TechNet Security bulletins to see specific problems and
             vulnerabilities in any particular operating system.
            Students can wipe old hard drives with lower capacities to prepare them for
             donation. Some hard drive companies have data wiping software that can be
             demonstrated during this section.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
Chapter 9: Teaching Analogies
            A computer is like a bank that has gold stored in it. When this bank was built, it did
             not have a vault or locks on the windows and doors. The bank is very susceptible to
             theft in this condition. Over time, the bank builders have learned how to lock the
             doors, build a vault, and guard the bank. The operating system patches and design
             changes that have been made to safeguard the computer are like the lockable
             doors on the bank. The anti-virus and other software that scans for spyware and
             malware are like the vault that protects the gold. The firewall that protects the
             computer is like the professionals who guard the bank.




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   12
Chapter 9: Suggested Class Discussion
                 What is an application vendor’s responsibility when security holes are found in the
                  vendor’s product?
                 What are the penalties for software piracy?
                   • Access the Business Software Alliance web site to see how to report piracy
                      anonymously.
                 What free anti-virus, anti-spam, and anti-spyware tools are available?
                 How can firewalls help to block viruses, spam, and spyware?
                 How do music and video piracy relate to computer security issues?
                 What is war driving? Is it legal?




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   13
Chapter 9: Best Practices

                 Have the students determine how many wireless networks are present in their
                  neighborhood.
                 Use the Internet to research legislation and fines that are related to computer
                  hacking with the words: lawsuits fines computer hacking.




Presentation_ID                                           © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14
Chapter 9: Outside Reading
                 National Security Agency
                  http://www.nsa.gov/

                 Verisign
                  http://www.verisign.com/




Presentation_ID                              © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   15
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   16
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   17

More Related Content

PDF
Integrating network virtualization security in OpenStack Deployments.pdf
PPTX
Safe Net: Cloud Security Solutions
PDF
WPA/WPA2 TKIP Exploit
PPTX
Data Center Security Now and into the Future
PDF
Part06 infrastructure security
TXT
Incompatible
DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
Integrating network virtualization security in OpenStack Deployments.pdf
Safe Net: Cloud Security Solutions
WPA/WPA2 TKIP Exploit
Data Center Security Now and into the Future
Part06 infrastructure security
Incompatible
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...

What's hot (6)

PDF
Skyjacking A Cisco WLAN - What it means and how to protect against it?
PDF
Collaborative Contingency in the Cloud
PPTX
Isday 2017 - Atelier Cisco
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PPTX
From Physical to Virtual to Cloud
PDF
End2end resilience
Skyjacking A Cisco WLAN - What it means and how to protect against it?
Collaborative Contingency in the Cloud
Isday 2017 - Atelier Cisco
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
From Physical to Virtual to Cloud
End2end resilience
Ad

Viewers also liked (20)

PPT
CCNA Discovery 1 - Chapter 1
PPT
CCNA Exploration 4 - Chapter 7
PPT
CCNA Exploration 4 - Chapter 8
PPT
CCNA Security - Chapter 3
PPTX
VMware vShield - Overview
PPTX
CCNA RS_NB - Chapter 8
PPTX
OSPF v3
PPT
CCNA Security - Chapter 7
PPT
CCNA Security - Chapter 8
PPT
CCNA Security - Chapter 6
PPT
CCNA Security - Chapter 5
PPT
CCNA Security - Chapter 9
PPT
CCNA Security - Chapter 4
PPT
CCNA Security 011- implementing ios-based ips
PPT
CCNA Security 09- ios firewall fundamentals
PPT
CCNA Discovery 1 - Chapter 4
PPT
CCNA Security 010-configuring cisco asa
PPT
CCNA Security 012- cryptographic systems
PPT
CCNA Security 06- AAA
PPT
ITE - Chapter 7
CCNA Discovery 1 - Chapter 1
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 8
CCNA Security - Chapter 3
VMware vShield - Overview
CCNA RS_NB - Chapter 8
OSPF v3
CCNA Security - Chapter 7
CCNA Security - Chapter 8
CCNA Security - Chapter 6
CCNA Security - Chapter 5
CCNA Security - Chapter 9
CCNA Security - Chapter 4
CCNA Security 011- implementing ios-based ips
CCNA Security 09- ios firewall fundamentals
CCNA Discovery 1 - Chapter 4
CCNA Security 010-configuring cisco asa
CCNA Security 012- cryptographic systems
CCNA Security 06- AAA
ITE - Chapter 7
Ad

Similar to ITE - Chapter 9 (20)

PDF
Cloud Computing Security
PDF
Bapinger Network Security
DOCX
PPTX
Smart cloud - single to multi cloud
PDF
VxWorks - Holistic Security (Art of Testing)
PDF
Smartphone Challenge: Guidelines for development of network friendly applicat...
PDF
Table of contents
PDF
Finjan Vital Security For eMail Technical White Paper
PDF
Building Microservices with Micronaut: A Full-Stack JVM-Based Framework
PDF
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
PDF
Building a chain of trust from the device to the cloud in 5G
PPT
ITE - Chapter 12
PDF
Computer Security - CCNA Security - Lecture 1
PDF
Viable means using which Wireless Network Security can be Jeopardized
PDF
Dedicated Hosting
PDF
The Future of Direct Communications Technologies and Proximity-based Applicat...
PPT
ITE - Chapter 8
DOCX
Study Wireless Security Deployment - PKL
PDF
Implementing Cisco Network Security Exam (210-260)
DOCX
Network virus detection & prevention
Cloud Computing Security
Bapinger Network Security
Smart cloud - single to multi cloud
VxWorks - Holistic Security (Art of Testing)
Smartphone Challenge: Guidelines for development of network friendly applicat...
Table of contents
Finjan Vital Security For eMail Technical White Paper
Building Microservices with Micronaut: A Full-Stack JVM-Based Framework
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
Building a chain of trust from the device to the cloud in 5G
ITE - Chapter 12
Computer Security - CCNA Security - Lecture 1
Viable means using which Wireless Network Security can be Jeopardized
Dedicated Hosting
The Future of Direct Communications Technologies and Proximity-based Applicat...
ITE - Chapter 8
Study Wireless Security Deployment - PKL
Implementing Cisco Network Security Exam (210-260)
Network virus detection & prevention

More from Irsandi Hasan (20)

PPTX
CCNA v6.0 ITN - Chapter 11
PPTX
CCNA v6.0 ITN - Chapter 10
PPTX
CCNA v6.0 ITN - Chapter 09
PPTX
CCNA v6.0 ITN - Chapter 08
PPTX
CCNA v6.0 ITN - Chapter 07
PPTX
CCNA v6.0 ITN - Chapter 06
PPTX
CCNA v6.0 ITN - Chapter 05
PPTX
CCNA v6.0 ITN - Chapter 04
PPTX
CCNA v6.0 ITN - Chapter 03
PPTX
CCNA v6.0 ITN - Chapter 02
PPTX
CCNA v6.0 ITN - Chapter 01
PPTX
CCNA RS_NB - Chapter 11
PPTX
CCNA RS_NB - Chapter 10
PPTX
CCNA RS_NB - Chapter 9
PPTX
CCNA RS_NB - Chapter 7
PPTX
CCNA RS_NB - Chapter 6
PPTX
CCNA RS_NB - Chapter 5
PPTX
CCNA RS_NB - Chapter 4
PPTX
CCNA RS_NB - Chapter 3
PPTX
CCNA RS_NB - Chapter 2
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 01
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 2

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
Teaching material agriculture food technology
PDF
KodekX | Application Modernization Development
PDF
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
MIND Revenue Release Quarter 2 2025 Press Release
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf
Approach and Philosophy of On baking technology
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Understanding_Digital_Forensics_Presentation.pptx
Programs and apps: productivity, graphics, security and other tools
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25 Week I
Teaching material agriculture food technology
KodekX | Application Modernization Development
Spectral efficient network and resource selection model in 5G networks

ITE - Chapter 9

  • 1. IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 9: Fundamental Security Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Chapter 9: Objectives  Explain why security is important.  Describe security threats.  Identify security procedures.  Identify common preventive maintenance techniques for security.  Troubleshoot security. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 9: Critical Concepts  What is this chapter about and why is it important?  This chapter details security concepts including security threats, security policy components, security implementation, preventive procedures, and common security problems.  Security is a vital part of computing and networking. IP version 4 was not meant as a secure protocol. It was developed to share information across a network environment. Because of maliciousness and business involvement, pop-ups, viruses, invasion of privacy, and spyware have evolved. According to a business advisory council, security must be taught in all classes in all aspects of computing. Every person involved with a computer must be made aware of security threats and measures that can be used to protect data and computerized equipment. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Chapter 9: Activities  What activities are associated with this chapter? 9.1 Worksheet: Security Attacks 9.2.1 Worksheet: Third-Party Anti-Virus Software 9.3.4 Packet Tracer Activity: Connecting Wireless PCs to a Linksys WRT300N 9.4.2 Worksheet: Operating System Updates 9.5.2 Worksheet: Gather Information from the Customer Chapter 9 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Chapter 9: New Terms  What terms are introduced in this chapter? ActiveX 9.2.2 adware 9.2.3 biometric device 9.3.3 card key 9.3.2 Denial of Service (DoS) 9.2.4 Distributed Denial of Service (DDoS) 9.2.7 DNS poisoning 9.2.7 encryption 9.3.3 grayware 9.2.3 Java 9.2.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Chapter 9: New Terms (continued)  What terms are introduced in this chapter? JavaScript 9.2.2 Lightweight Extensible Authentication Protocol (LEAP) 9.3.4 malware 9.2.3 man-in-the-middle 9.2.7 phishing 9.2.3 replay attack 9.2.7 Service Set Identifier (SSID) 9.3.4 social engineering 9.2.6 spam 9.2.5 spoof 9.2.7 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Chapter 9: New Terms (continued)  What terms are introduced in this chapter? SYN flood 9.2.7 Trojan threat 9.2.1 virus 9.2.1 Wi-Fi Protected Access (WPA) 9.3.4 Wi-Fi Protected Access 2 (WPA2) 9.3.4 Wired Equivalent Privacy (WEP) 9.3.4 wireless network 9.3.4 Wireless Transport Layer Security (WTLS) 9.3.4 worm 9.2.1 zombie 9.2.4 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Chapter 9: Changes  What has changed from the previous version (4.0) of ITEPC? Page 9.2.8 Explain data wiping, hard drive destruction, and recycling • Data wiping Page 9.3.1 Explain what is required in a basic local security policy • Compliance • Classification Page 9.3.2 Explain the tasks required to protect physical equipment • Intrusion detection • Trusted Platform Module (TPM) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Chapter 9: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 9.3.3 Describe ways to protect data • Data Encryption • Software Firewall • Data Backups • Smart Card Security • Biometric Security • File System Security Page 9.3.4 Describe wireless security techniques • SSID • MAC Filtering • WEP • WPA • WPA2 • LEAP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Chapter 9: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 9.5.1 Review the troubleshooting process • Identify the Problem • Establish a Theory of Probable Causes • Determine an Exact Cause • Implement a Solution • Verify Solution and Full System Functionality • Document Findings Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Chapter 9: Classroom Management  Wireless is a great way to teach security. Authentication and encryption can be applied one at a time, and then have students access the wireless network by applying the appropriate credentials.  Search the Internet for current virus and malware attacks and any trends in attacks.  Access Microsoft TechNet Security bulletins to see specific problems and vulnerabilities in any particular operating system.  Students can wipe old hard drives with lower capacities to prepare them for donation. Some hard drive companies have data wiping software that can be demonstrated during this section. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Chapter 9: Teaching Analogies  A computer is like a bank that has gold stored in it. When this bank was built, it did not have a vault or locks on the windows and doors. The bank is very susceptible to theft in this condition. Over time, the bank builders have learned how to lock the doors, build a vault, and guard the bank. The operating system patches and design changes that have been made to safeguard the computer are like the lockable doors on the bank. The anti-virus and other software that scans for spyware and malware are like the vault that protects the gold. The firewall that protects the computer is like the professionals who guard the bank. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Chapter 9: Suggested Class Discussion  What is an application vendor’s responsibility when security holes are found in the vendor’s product?  What are the penalties for software piracy? • Access the Business Software Alliance web site to see how to report piracy anonymously.  What free anti-virus, anti-spam, and anti-spyware tools are available?  How can firewalls help to block viruses, spam, and spyware?  How do music and video piracy relate to computer security issues?  What is war driving? Is it legal? Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Chapter 9: Best Practices  Have the students determine how many wireless networks are present in their neighborhood.  Use the Internet to research legislation and fines that are related to computer hacking with the words: lawsuits fines computer hacking. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Chapter 9: Outside Reading  National Security Agency http://www.nsa.gov/  Verisign http://www.verisign.com/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17