Basic security
This presentation is the property of its rightful owner.
Sponsored Links
1 / 21

Basic Security PowerPoint PPT Presentation


  • 88 Views
  • Uploaded on
  • Presentation posted in: General

Basic Security. Networking for Home and Small Businesses – Chapter 8. Objectives. Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications.

Download Presentation

Basic Security

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Basic security

Basic Security

Networking for Home and Small Businesses – Chapter 8


Objectives

Objectives

  • Identify and describe the various networking threats.

  • Identify different methods of attack.

  • Describe security procedures and applications.

  • Describe the features of a firewall and how it can be used to protect against an attack.


Networking threats

Networking Threats

  • Describe major risks of network intrusion


Networking threats1

Networking Threats

  • Define the sources of network intrusion.


Networking threats2

Networking Threats

  • Describe social engineering and phishing


Methods of attack

Methods of Attack

  • Describe viruses, worms, and Trojan horses.


Methods of attack1

Methods of Attack

  • Denial of Service and Brute Force attacks


Methods of attack2

Methods of Attack

  • Describe spyware, tracking cookies, adware and pop-ups.


Methods of attack3

Methods of Attack

  • Describe Spam


Security procedures and applications

Security Procedures and Applications

  • Defining a security policy


Security procedures and applications1

Security Procedures and Applications

  • Define common security procedures


Security procedures and applications2

Security Procedures and Applications

  • Describe how updates and patches relate to security issues.


Security procedures and applications3

Security Procedures and Applications

  • Anti-virus software


Security procedures and applications4

Security Procedures and Applications

  • SPAMprevention


Security procedures and applications5

Security Procedures and Applications

  • Anti-Spyware


Firewall features and how to use them to protect against an attack

Firewall Features and How to Use them to Protect Against an Attack

  • What is a firewall?


Firewall features and how to use them to protect against an attack1

Firewall Features and How to Use them to Protect Against an Attack

  • Using a Firewall to Protect Against an Attack


Firewall features and how to use them to protect against an attack2

Firewall Features and How to Use them to Protect Against an Attack

  • Vulnerability Analysis


Firewall features and how to use them to protect against an attack3

Firewall Features and How to Use them to Protect Against an Attack

  • Security Best Practices


Summary

Summary

  • Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals.

  • Effective network security is based on a variety of products and services, combined with a thorough security policy.

  • A firewall controls traffic between networks and helps prevent unauthorized access.


  • Login