Basic security
Download
1 / 21

Basic Security - PowerPoint PPT Presentation


  • 114 Views
  • Uploaded on

Basic Security. Networking for Home and Small Businesses – Chapter 8. Objectives. Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Basic Security' - miron


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Basic security

Basic Security

Networking for Home and Small Businesses – Chapter 8


Objectives
Objectives

  • Identify and describe the various networking threats.

  • Identify different methods of attack.

  • Describe security procedures and applications.

  • Describe the features of a firewall and how it can be used to protect against an attack.


Networking threats
Networking Threats

  • Describe major risks of network intrusion


Networking threats1
Networking Threats

  • Define the sources of network intrusion.


Networking threats2
Networking Threats

  • Describe social engineering and phishing


Methods of attack
Methods of Attack

  • Describe viruses, worms, and Trojan horses.


Methods of attack1
Methods of Attack

  • Denial of Service and Brute Force attacks


Methods of attack2
Methods of Attack

  • Describe spyware, tracking cookies, adware and pop-ups.


Methods of attack3
Methods of Attack

  • Describe Spam


Security procedures and applications
Security Procedures and Applications

  • Defining a security policy


Security procedures and applications1
Security Procedures and Applications

  • Define common security procedures


Security procedures and applications2
Security Procedures and Applications

  • Describe how updates and patches relate to security issues.






Firewall features and how to use them to protect against an attack1
Firewall Features and How to Use them to Protect Against an Attack

  • Using a Firewall to Protect Against an Attack




Summary
Summary Attack

  • Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals.

  • Effective network security is based on a variety of products and services, combined with a thorough security policy.

  • A firewall controls traffic between networks and helps prevent unauthorized access.


ad