1 / 17

IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 9: Fundamental Security

IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 9: Fundamental Security. Chapter 9: Objectives. Explain why security is important. Describe security threats. Identify security procedures. Identify common preventive maintenance techniques for security.

czachery
Download Presentation

IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 9: Fundamental Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT Essentials PC Hardware and Software 4.1Instructional ResourceChapter 9: Fundamental Security

  2. Chapter 9: Objectives Explain why security is important. Describe security threats. Identify security procedures. Identify common preventive maintenance techniques for security. Troubleshoot security.

  3. Chapter 9: Critical Concepts • What is this chapter about and why is it important? • This chapter details security concepts including security threats, security policy components, security implementation, preventive procedures, and common security problems. • Security is a vital part of computing and networking. IP version 4 was not meant as a secure protocol. It was developed to share information across a network environment. Because of maliciousness and business involvement, pop-ups, viruses, invasion of privacy, and spyware have evolved. According to a business advisory council, security must be taught in all classes in all aspects of computing. Every person involved with a computer must be made aware of security threats and measures that can be used to protect data and computerized equipment.

  4. Chapter 9: Activities What activities are associated with this chapter? 9.1 Worksheet: Security Attacks 9.2.1 Worksheet: Third-Party Anti-Virus Software 9.3.4 Packet Tracer Activity: Connecting Wireless PCs to a Linksys WRT300N 9.4.2 Worksheet: Operating System Updates 9.5.2 Worksheet: Gather Information from the Customer Chapter 9 Quiz

  5. Chapter 9: New Terms What terms are introduced in this chapter?

  6. Chapter 9: New Terms (continued) What terms are introduced in this chapter?

  7. Chapter 9: New Terms (continued) What terms are introduced in this chapter?

  8. Chapter 9: Changes What has changed from the previous version (4.0) of ITEPC? Page 9.2.8 Explain data wiping, hard drive destruction, and recycling Data wiping Page 9.3.1 Explain what is required in a basic local security policy Compliance Classification Page 9.3.2 Explain the tasks required to protect physical equipment Intrusion detection Trusted Platform Module (TPM)

  9. Chapter 9: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 9.3.3 Describe ways to protect data Data Encryption Software Firewall Data Backups Smart Card Security Biometric Security File System Security Page 9.3.4 Describe wireless security techniques SSID MAC Filtering WEP WPA WPA2 LEAP

  10. Chapter 9: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 9.5.1 Review the troubleshooting process Identify the Problem Establish a Theory of Probable Causes Determine an Exact Cause Implement a Solution Verify Solution and Full System Functionality Document Findings

  11. Chapter 9: Classroom Management Wireless is a great way to teach security. Authentication and encryption can be applied one at a time, and then have students access the wireless network by applying the appropriate credentials. Search the Internet for current virus and malware attacks and any trends in attacks. Access Microsoft TechNet Security bulletins to see specific problems and vulnerabilities in any particular operating system. Students can wipe old hard drives with lower capacities to prepare them for donation. Some hard drive companies have data wiping software that can be demonstrated during this section.

  12. Chapter 9: Teaching Analogies A computer is like a bank that has gold stored in it. When this bank was built, it did not have a vault or locks on the windows and doors. The bank is very susceptible to theft in this condition. Over time, the bank builders have learned how to lock the doors, build a vault, and guard the bank. The operating system patches and design changes that have been made to safeguard the computer are like the lockable doors on the bank. The anti-virus and other software that scans for spyware and malware are like the vault that protects the gold. The firewall that protects the computer is like the professionals who guard the bank.

  13. What is an application vendor’s responsibility when security holes are found in the vendor’s product? What are the penalties for software piracy? Access the Business Software Alliance web site to see how to report piracy anonymously. What free anti-virus, anti-spam, and anti-spyware tools are available? How can firewalls help to block viruses, spam, and spyware? How do music and video piracy relate to computer security issues? What is war driving? Is it legal? Chapter 9: Suggested Class Discussion

  14. Chapter 9: Best Practices • Have the students determine how many wireless networks are present in their neighborhood. • Use the Internet to research legislation and fines that are related to computer hacking with the words: lawsuits fines computer hacking.

  15. Chapter 9: Outside Reading National Security Agency http://www.nsa.gov/ Verisign http://www.verisign.com/

More Related