© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Chapter 26.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
CIT In this chapter you will learn how to:  Explain the threats to your computers and data  Describe key security concepts and technologies.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Using Windows Firewall and Windows Defender
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Computer Security. Through your PC, a malicious person can gain valuable information About you and your habits Can steal your files Run programs that.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Troubleshooting Windows Vista Security Chapter 4.
Types of Electronic Infection
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
NetTech Solutions Security and Security Permissions Lesson Nine.
Managing Applications, Services, Folders, and Libraries Lesson 4.
NetTech Solutions Protecting the Computer Lesson 10.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
W elcome to our Presentation. Presentation Topic Virus.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Configuring Windows Firewall with Advanced Security
Information Security Session October 24, 2005
Lesson 16-Windows NT Security Issues
Computer Security.
Securing Windows 7 Lesson 10.
Presentation transcript:

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Chapter 26 Securing Computers

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Overview In this chapter, you will learn how to –Explain the threats to your computers and data –Describe key security concepts and technologies –Explain how to protect computers from network threats

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Analyzing the Threat Threats to your data come from accidents and malicious people Accidents are more common –Deleted files –Hard drive crashes –Scratched discs Malicious intent gets all the press Look at two general areas –Unauthorized access –Direct physical problems or attacks

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Unauthorized Access Unauthorized access can come from many directions –Curiosity and poor user account management –Dumpster diving –Social engineering techniques to gain access –Infiltration –Telephone scams –Phishing

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Curiosity and Account Control Unauthorized access –Occurs when any user accesses resources in an unauthorized way –Often a user with just enough skill pokes around and finds access to something he or she shouldn’t have Administrative access –Improper control of administrator accounts is dangerous –Some versions of Windows (such as Windows XP Home) make it easy to use administrator accounts improperly

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Dumpster Diving What is it? –Searching through trash looking for information –Individual pieces of data can be put together as a puzzle How do you stop it? –Shred all documents Use a Cross Cut shredder –3/8” x 1 ½” Good home use –1/32” x ½” DoD and RCMP Top Secret Documents –Lock area (when possible) where trash is placed outside

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Social Engineering Using or manipulating people in the network to gain access to the network Infiltration –Entering building in the guise of legitimacy –Talking to people, gathering pieces of information Telephone scams –Simply asking for information –Impersonating someone else and getting a password reset Phishing –Using the Internet to pretend to be someone you’re not to get information (user names and passwords)

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Data Destruction Unauthorized access can lead to loss or theft of important or sensitive data Data destruction doesn’t even have to be intentional –Could be accidental data loss –Unauthorized data modification “The system should have stopped me if I wasn’t supposed to do that!”

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Physical Threats Damage or loss of physical assets can prove devastating Catastrophic hardware failures –Hard drives crash, power fails –Redundant systems provide protection Physical theft –Servers need to be kept behind locked doors –Don’t ignore physical security –Use a cable lock on portable and desktop systems Viruses/spyware –Come from the Internet, floppy disks, optical discs, and USB drives

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Security Concepts and Technologies After assessing the threats, it’s time to secure the network Strategic and tactical goals –Understand the big picture and technologies available for securing the network –Know the specific tools for securing resources on the network Strategic –Access control –Data classification and compliance –Reporting

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Access Control Access control has two meanings –The process of controlling access to data Physical security Authentication Users and groups Security Policies –Access control list – a piece of data stored on a server, router, etc. that defines what users or systems have access to a resource Let’s cover the first one

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Access Control (continued) Physical security –Keeping doors locked –Don’t walk away from logged-in systems Authentication –How the computer determines who can and can’t have access Use proper complex passwords –Not just for Windows login (CMOS, routers) –Software password generators make great passwords –Hardware authentication Smart cards Biometric devices

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Access Control (continued) Users and Groups –Use NTFS with your Users and Groups –Remember the principle of “Least Privilege” Only grant the minimum privileges for a user to get the job done Easy to grant more; hard to revoke privileges –Give permissions to groups, not user accounts –Then add user accounts to the appropriate groups

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Access Control (continued) Effective permissions –Users are invariably members of more than one group –If a user accesses a resource, Windows examines Group affiliation to determine effective permissions

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Access Control (continued) Security Policies –Security policies address issues that fall outside the scope of NTFS permissions Can the user change his or her password? Can the user see the RUN command? Can the user install software? –Local security policies are applied to an individual computer –Domain group policies are applied to all the computers in a domain

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Sample Security Policies Prevent Registry Edits –If you try to edit the Registry, you get a failure message Prevent Access to the Command Prompt –Keeps users from getting to the command prompt by turning off the Run command and the MS-DOS Prompt shortcut Log on Locally –Defines who may log on to the system locally Shut Down System –Defines who may shut down the system

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Sample Security Policies (continued) Minimum Password Length –Forces a minimum password length Account Lockout Threshold –Sets the maximum number of logon attempts a person can make before being locked out of the account Disable Windows Installer –Prevents users from installing software Printer Browsing –Enables users to browse for printers on the network, as opposed to using only assigned printers

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Lab – Playing with Fire On your Windows XP computer, go to Administrative Tools and run Local Security Policy See if you can answer these questions –How does User Rights Assignment enable you to control access to the physical machine? –How do the Security Options help secure things? What can you do here? It’s important to note here that you can negatively impact or make a PC inoperable by making a security policy mistake

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Data Classification and Compliance Data classification –Organizing data according to sensitivity –Varies by organization TOP SECRET Compliance –Members must comply with rules that apply to the organization –Laws and company policies apply and should be followed

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Reporting Event Viewer –Event Viewer works as well for security as it does for Windows troubleshooting –The Security section of Event Viewer shows all security events –Most of the interesting security events are not recorded in Event Viewer by default –To see these events, you have to audit them Incidence Reporting –Providing documentation for an event of interest –Intrusion, incoming phishing, malware –Event Viewer logs are the main tool

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Network Security Networks face external threats in addition to all those internal threats This section looks at three areas –Internet-borne attacks, such as malware –Firewalls –Wireless networking

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition You’ve got Virus! Hey, new mail coming your way! Malicious Software Together known as malware –Grayware –Viruses –Trojans –Worms

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Grayware Not destructive in itself –Leach bandwidth in networks –Some people consider them beneficial –Used to share files (e.g., BitTorrent) –Can push network over the edge

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Grayware (continued) Pop-ups –Many modify the browser, making it hard to close the pop-up window Some open up other pop-ups when one pop-up is closed –Newer browsers block pop-ups politely

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Spyware Family of programs that run in the background –Can send information on your browsing habits –Can run distributed computing apps, capture keystrokes to steal passwords, reconfigure dial-up, and more Preventing installation –Beware of “free” programs such as Gator, Kazaa, others –Adobe’s Shockwave and Flash reputable, but many others are not

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Aggressive tactics –Try to scare you into installing their program Removing Spyware –Windows Defender –Lavasoft’s Ad-Aware –PepiMK’s Spybot Search & Destroy Spyware (continued)

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Spam Unsolicited To avoid, don’t give out your address Definitely don't post it on the Web! Implement antispam settings or software

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Malware Viruses –Designed to attach themselves to a program –When program is used, the virus goes into action –Can wipe out data, send spam s, and more –Can hide in macros – scripting commands for various programs such as Access Trojans –Complete program –Designed to look like one program (such as a game or utility) –Does something else, too, such as erase CMOS

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Malware (continued) Worms –Similar to a Trojan, but on a network –Travels from machine to machine through the network –Commonly infects systems because of security flaws Best protection against worms –Run antivirus software –Keep security patches up to date –Use tools such as Windows Update or Automatic Update to get high-priority updates –Patch management

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Virus Prevention and Recovery You need to take steps to secure computers to prevent attacks –Run an updated antivirus program –Practice proper prevention techniques You also need a plan for recovery in case a virus affects computers on your network –Recognize the attack –Fix things –Recover Let’s take a look

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Antivirus Programs Antivirus programs –Can be set to scan entire computer actively for viruses –Can be set as virus shield to monitor activity such as downloading files, receiving , etc. –Run Windows Defender Microsoft’s free antivirus/anti-malware program Check Security Center in Vista Not used in Windows 7 or recent updates to Vista

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Antivirus Programs (continued) Virus Shield –Viruses have digital signatures –Antivirus programs have libraries of signatures called definitions –Updated regularly Use an automatic update if possible

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Virus Techniques and Traits Polymorphics/Polymorphs –Viruses attempt to change or morph to prevent detection –Code that morphs (scrambling code) often used as signature, so detectable by antivirus programs Stealth –Virus attempts to hide and appear invisible –Most are in boot sector –Some use little-known software interrupt –Others make copies of innocent-looking files

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Virus Prevention Tips Scan all incoming programs and data Scan the PC daily and update signatures regularly Keep bootable CD-R with copy of antivirus program –Scan if you think PC or connected media might be affected Be careful with –Consider disabling preview window –Only open attachments from known sources

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Virus Recovery Tips Recognize –Learn to recognize how a system reacts to malware Quarantine –What you do to prevent malware from propagating Search and destroy –What you do to remove malware from infected systems Remediate –What you do to return the system to normal after the malware is gone Educate –How you train users to prevent malware outbreaks

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Virus Recovery Tips (continued) Recognize –If a computer starts spewing , that’s a sign of problems –Computers that run very slowly can indicate malware –Computers with heavy network activity but few active programs point to malware Quarantine –Run packet-sniffing software to alert you to any unusual activity –Pull the cable! A computer that’s not connected to a network can’t propagate a virus

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Virus Recovery Tips (continued) Search and destroy –Boot the computer to a removable disc with antivirus software included (an antivirus CD-R) Commercial tools, such as avast! LiveCD with Linux-based tools Ultimate Boot CD comes with several antivirus programs –Run the antivirus software as a sword to scan the infected system

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Virus Recovery Tips (continued) Search and destroy –Check all removable media that might have been infected –Manually disable Browser Helper Objects (BHOs) installed by viruses In Internet Explorer, go to Tools | Manage Add-ons Select a suspect BHO Click Disable

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Virus Recovery Tips (continued) Remediate –Fix any low-level damage by booting to the recovery console (Windows 2000/XP) or the Windows Vista repair environment FIXMBR and FIXBOOT can repair the boot sector BOOTCFG re-creates the BOOT.INI file Vista offers Startup Repair, System Restore, and other tools Educate –You need to train your users to know when not to click or open attachments

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Internet Firewalls Used to block malicious programs from the Internet –Can be software, hardware, or both –Windows has built-in firewall (see Control Panel)

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Network Authentication Authentication –Proving who you are –Done by providing credentials i.e., user name and password –LAN authentication like Kerberos useful for supporting multiple NOSs and providing secure login within a network –Not so hot for remote access authentication

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Network Authentication (continued) Common remote access protocols –PAP: Password Authentication Protocol (clear text) Rarely used –CHAP: Challenge Handshake Authentication Protocol Most popular –MS-CHAP: Microsoft CHAP Popular with Microsoft applications

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Our lowest sell price is $150,000 Encryption algorithm *2jkpS^ `_4Laujpf Decryption algorithm Our lowest sell price is $150,000 Encryption Makes data packets unreadable –Changes plaintext into cipher text –Encryption occurs at many levels –Multiple encryption standards and options

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Encryption (continued) Dial-up encryption –Encrypts data over lines –Method set on the server Data encryption –Multiple protocols possible –These standards used in connecting computers to some kind of private connection, like ISDN or T1 –Microsoft method of choice is IPSec (IP Security)

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Application Encryption Many applications can use other protocols to encrypt data –On the Web, HTTPS commonly used –Use digital certificates –Certificates issued by trusted authorities Trusted authorities added to Web browsers –Invalid certificates can be cleared from SSL cache

© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition