Beruflich Dokumente
Kultur Dokumente
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
Identify and describe the various networking threats.
Identify different methods of attack.
Describe security procedures and applications.
Describe the features of a firewall and how it can be
used to protect against an attack.
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Networking Threats
Describe major risks of network intrusion
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Networking Threats
Define the sources of network intrusion.
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Networking Threats
Describe social engineering and phishing
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Methods of Attack
Describe viruses, worms, and Trojan horses.
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Methods of Attack
Denial of Service and Brute Force attacks
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Methods of Attack
Describe spyware, tracking cookies, adware and pop-
ups.
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Methods of Attack
Describe Spam
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Security Procedures and Applications
Defining a security policy
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Security Procedures and Applications
Define common security procedures
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Security Procedures and Applications
Describe how updates and patches relate to security
issues.
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Security Procedures and Applications
Anti-virus software
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Security Procedures and Applications
SPAM prevention
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Security Procedures and Applications
Anti-Spyware
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Firewall Features and How to Use them to
Protect Against an Attack
What is a firewall?
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Firewall Features and How to Use them to
Protect Against an Attack
Using a Firewall to Protect Against an Attack
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Firewall Features and How to Use them to
Protect Against an Attack
Vulnerability Analysis
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Firewall Features and How to Use them to
Protect Against an Attack
Security Best Practices
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Summary
Networks can be open to intrusion through
vulnerabilities in software, hardware attacks, or the
weaknesses of individuals.
Effective network security is based on a variety of
products and services, combined with a thorough
security policy.
A firewall controls traffic between networks and helps
prevent unauthorized access.
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21