© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 1 - Modern Security Threats.

Slides:



Advertisements
Similar presentations
IT Essentials 5.0 Overview February Cisco Public © 2013 Cisco and/or its affiliates. All rights reserved. 2.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Networking Academy Advanced Technology Update June 19, 2008.
Let’s Talk About Cyber Security
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Updated February 2012.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 4 – Implementing Firewall Technologies.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 3 – Authentication, Authorization and Accounting.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
1 Packet Sniffers Prepared By: Amer Alhorini Supervised By: Dr. Lo'ai Tawalbeh NYIT New York Institute of Technology.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Network Threats and Mitigation Networking Essentials Chapter 14 Spring, 2013.
Enterprise Network Security Accessing the WAN Lecture week 4.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
CYBER CRIME AND SECURITY TRENDS
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Copyright 2010 Kenneth M. Chipps Ph.D. How To Pass the CCNA Test Last Update
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 5 – Implementing Intrusion Prevention.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
IS Network and Telecommunications Risks Chapter Six.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
June 2015 Entitling All Our Customers to Smart Capabilities SMARTnet and Smart Net Total Care Convergence.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Management of IT Auditing John Schultz. Define IT – What areas should be considered for inclusion in an IT audit plan? Evaluate IT-related Risk – Doing.
Management Plan Goran Smajlagic S English 2100.
Enterprise Network Security Accessing the WAN – Chapter 4.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
Chapter 4: Implementing Firewall Technologies
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
NetTech Solutions Protecting the Computer Lesson 10.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Chapter 1: Explore the Network
Computer Hope Copyright © Cannady ACOS. All rights reserved. (R1: July 2011)
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Cyber crime and security issues
Speaker Name Speaker Title Date Get the Most from Your Technology Investment Cisco Services.
Chapter 40 Internet Security.
Managing Windows Security
Administrative Details
Enterprise Network Security
Teaching Computing to GCSE
Risk of the Internet At Home
Enterprise Network Security
Networking for Home and Small Businesses – Chapter 8
Enterprise Network Security
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 1 - Modern Security Threats

© 2012 Cisco and/or its affiliates. All rights reserved. 2 Describe the evolution of network security. Describe the drivers for network security. Describe the major network security organizations. Describe the domains of network security. Describe network security policies. Describe viruses, worms, and Trojan Horses. Describe how to mitigate threats from viruses, worms, and Trojan Horses. Describe how network attacks are categorized. Describe reconnaissance attacks. Describe access attacks. Describe Denial of Service attacks. Describe how to mitigate network attacks.

© 2012 Cisco and/or its affiliates. All rights reserved Understanding Security Threats 1.1 Describe common security threats Common threats to the physical installation Mitigation methods for common network attacks based threats* Web-based attacks* Mitigation methods for Worm, Virus, and Trojan Horse attacks Mobile/remote security* *These claims are also covered in later chapters in more detail.

© 2012 Cisco and/or its affiliates. All rights reserved. 4 Almost as long as there have been computer networks, there have been attacks against them. Network security has to balance the demand to make the network available with the need to keep data and information secure. Network security professionals have to stay up to date with attacks and mitigation techniques. This includes maintaining awareness of the organizations that track and report on trending threats.

© 2012 Cisco and/or its affiliates. All rights reserved. 5 Chapter 0 Lab: Configuring Devices for Use with Cisco Configuration Professional Part 1: Basic Network Device Configuration Part 2: Configure CCP Access for Routers Part 3: Basic CCP Configuration Chapter 1 Lab: Researching Network Attacks and Security Audit Tools Part 1: Researching Network Attacks Part 2: Researching Security Audit Tools

© 2012 Cisco and/or its affiliates. All rights reserved. 6

7

8

9

10 Timelines for events, threats and mitigation methods have been updated. SecureX is introduced and will be explained in detail in Chapter 9. A reference to the Cisco Adaptive Security Appliance (ASA) has been added. The ASA will be introduced in Chapter 10.

© 2012 Cisco and/or its affiliates. All rights reserved. 11 The first lab (Chapter 0) leads students through configuring devices to use Cisco Configuration Professional (CCP). Since CCP is used extensively throughout the labs, it is critical that all students perform this lab. This is also a good time for students to practice basic configuration and cabling. If you are short on time or equipment, pre-configure Part 1 of the lab and have students focus on Parts 2 and 3. The lab for Chapter 1 is a research lab and could be extended beyond this chapter.

© 2012 Cisco and/or its affiliates. All rights reserved. 12 Remind students that the term “virus” was adopted because of the similarity in form, function and consequence with biological viruses that attack the human system. Like their biological counterparts, computer viruses can spread rapidly and self- replicate systematically. They also mimic living viruses in the way they must adapt through mutation to the development of resistance within a system: the author of a computer virus must upgrade his creation in order to overcome the resistance (antiviral programs) or to take advantage of a new weakness or loophole within the system.

© 2012 Cisco and/or its affiliates. All rights reserved. 13 Is hacking always bad? What kind of penalties should hacking involve? Monetary? Punitive? Discuss the effects on an organization’s credibility after a hacking incident. Discuss the employment opportunities for security professionals and the long term outlook. Have students browse online job sites to get an idea of the requirements for security related jobs. Discuss various certifications. Students may be tempted to download some of the applications mentioned in the chapter. Be sure to discuss with them your own organization’s policy and the expectations your have for their use of the network.

© 2012 Cisco and/or its affiliates. All rights reserved. 14 There have been a number of celebrities hacked recently. Students may find it interesting to research these incidents with a better understanding of the types of network attacks. It is important that students understand that network security is ever evolving. To better understand this, have them follow a security news website or blog for a week Have students update the anti-virus software on their personal computers. For those who do not have anti-virus software, discuss no-cost options.

© 2012 Cisco and/or its affiliates. All rights reserved

© 2011 Cisco and/or its affiliates. All rights reserved. 16