Networking for Home and Small Businesses – Chapter 8

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

4 Information Security.
Computer Tech. What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Information Systems
A First Course in Information Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
IT security By Tilly Gerlack.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
Internet safety By Suman Nazir
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
Protecting Servers and Clients
Securing Information Systems
Top 5 Open Source Firewall Software for Linux User
Working at a Small-to-Medium Business or ISP – Chapter 8
MALWARE Autumn Mattis.
Instructor Materials Chapter 7 Network Security
Systems Security Keywords Protecting Systems
GLOBALTECH SQUAD Toll Free:
Lecture 5. Security Threats
Network security threats
Cyber Security By: Pratik Gandhi.
Information and documentation media systems.
Answer the questions to reveal the blocks and guess the picture.
CHAPTER 4 Information Security.
Protect Your Computer Against Harmful Attacks!
Securing Information Systems
Unit 32 – Networked Systems Security
Teaching Computing to GCSE
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the features.
Protecting Servers and Clients
Unit 1.6 Systems security Lesson 3
Risk of the Internet At Home
Information Security CIS 9002 Kannan Mohan Department of CIS
Reconnaissance Report Trillium Technologies
Networking for Home and Small Businesses – Chapter 8
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
Presentation transcript:

Networking for Home and Small Businesses – Chapter 8 Basic Security Networking for Home and Small Businesses – Chapter 8

Objectives Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications. Describe the features of a firewall and how it can be used to protect against an attack.

Networking Threats Describe major risks of network intrusion

Networking Threats Define the sources of network intrusion.

Networking Threats Describe social engineering and phishing

Methods of Attack Describe viruses, worms, and Trojan horses.

Methods of Attack Denial of Service and Brute Force attacks

Methods of Attack Describe spyware, tracking cookies, adware and pop-ups.

Methods of Attack Describe Spam

Security Procedures and Applications Defining a security policy

Security Procedures and Applications Define common security procedures

Security Procedures and Applications Describe how updates and patches relate to security issues.

Security Procedures and Applications Anti-virus software

Security Procedures and Applications SPAM prevention

Security Procedures and Applications Anti-Spyware

Firewall Features and How to Use them to Protect Against an Attack What is a firewall?

Firewall Features and How to Use them to Protect Against an Attack Using a Firewall to Protect Against an Attack

Firewall Features and How to Use them to Protect Against an Attack Vulnerability Analysis

Firewall Features and How to Use them to Protect Against an Attack Security Best Practices

Summary Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals. Effective network security is based on a variety of products and services, combined with a thorough security policy. A firewall controls traffic between networks and helps prevent unauthorized access.