Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 1 - Modern Security Threats.

Similar presentations


Presentation on theme: "© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 1 - Modern Security Threats."— Presentation transcript:

1 © 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 1 - Modern Security Threats

2 © 2012 Cisco and/or its affiliates. All rights reserved. 2 Describe the evolution of network security. Describe the drivers for network security. Describe the major network security organizations. Describe the domains of network security. Describe network security policies. Describe viruses, worms, and Trojan Horses. Describe how to mitigate threats from viruses, worms, and Trojan Horses. Describe how network attacks are categorized. Describe reconnaissance attacks. Describe access attacks. Describe Denial of Service attacks. Describe how to mitigate network attacks.

3 © 2012 Cisco and/or its affiliates. All rights reserved. 3 1.0 Understanding Security Threats 1.1 Describe common security threats 1.1.1 Common threats to the physical installation 1.1.2 Mitigation methods for common network attacks 1.1.3 Email-based threats* 1.1.4 Web-based attacks* 1.1.5 Mitigation methods for Worm, Virus, and Trojan Horse attacks 1.1.8 Mobile/remote security* *These claims are also covered in later chapters in more detail.

4 © 2012 Cisco and/or its affiliates. All rights reserved. 4 Almost as long as there have been computer networks, there have been attacks against them. Network security has to balance the demand to make the network available with the need to keep data and information secure. Network security professionals have to stay up to date with attacks and mitigation techniques. This includes maintaining awareness of the organizations that track and report on trending threats.

5 © 2012 Cisco and/or its affiliates. All rights reserved. 5 Chapter 0 Lab: Configuring Devices for Use with Cisco Configuration Professional Part 1: Basic Network Device Configuration Part 2: Configure CCP Access for Routers Part 3: Basic CCP Configuration Chapter 1 Lab: Researching Network Attacks and Security Audit Tools Part 1: Researching Network Attacks Part 2: Researching Security Audit Tools

6 © 2012 Cisco and/or its affiliates. All rights reserved. 6

7 7

8 8

9 9

10 10 Timelines for events, threats and mitigation methods have been updated. SecureX is introduced and will be explained in detail in Chapter 9. A reference to the Cisco Adaptive Security Appliance (ASA) has been added. The ASA will be introduced in Chapter 10.

11 © 2012 Cisco and/or its affiliates. All rights reserved. 11 The first lab (Chapter 0) leads students through configuring devices to use Cisco Configuration Professional (CCP). Since CCP is used extensively throughout the labs, it is critical that all students perform this lab. This is also a good time for students to practice basic configuration and cabling. If you are short on time or equipment, pre-configure Part 1 of the lab and have students focus on Parts 2 and 3. The lab for Chapter 1 is a research lab and could be extended beyond this chapter.

12 © 2012 Cisco and/or its affiliates. All rights reserved. 12 Remind students that the term “virus” was adopted because of the similarity in form, function and consequence with biological viruses that attack the human system. Like their biological counterparts, computer viruses can spread rapidly and self- replicate systematically. They also mimic living viruses in the way they must adapt through mutation to the development of resistance within a system: the author of a computer virus must upgrade his creation in order to overcome the resistance (antiviral programs) or to take advantage of a new weakness or loophole within the system.

13 © 2012 Cisco and/or its affiliates. All rights reserved. 13 Is hacking always bad? What kind of penalties should hacking involve? Monetary? Punitive? Discuss the effects on an organization’s credibility after a hacking incident. Discuss the employment opportunities for security professionals and the long term outlook. Have students browse online job sites to get an idea of the requirements for security related jobs. Discuss various certifications. Students may be tempted to download some of the applications mentioned in the chapter. Be sure to discuss with them your own organization’s policy and the expectations your have for their use of the network.

14 © 2012 Cisco and/or its affiliates. All rights reserved. 14 There have been a number of celebrities hacked recently. Students may find it interesting to research these incidents with a better understanding of the types of network attacks. It is important that students understand that network security is ever evolving. To better understand this, have them follow a security news website or blog for a week. http://www.networkworld.com/topics/security.html http://www.securityfocus.com/ http://www.bestsecuritytips.com/ http://www.techworld.com/security/ Have students update the anti-virus software on their personal computers. For those who do not have anti-virus software, discuss no-cost options. http://www.avast.com/free-antivirus-download http://free.avg.com/us-en/homepage

15 © 2012 Cisco and/or its affiliates. All rights reserved. 15 http://www.toptechnews.com/section.xhtml?category=75 http://www.cert.org/cert/ http://sectools.org/ http://www.networksecurityjournal.com/ http://www.eweek.com/c/s/Security/

16 © 2011 Cisco and/or its affiliates. All rights reserved. 16


Download ppt "© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 1 - Modern Security Threats."

Similar presentations


Ads by Google