IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,

Slides:



Advertisements
Similar presentations
IT-320Chapter 5 IP Addressing. Objectives 1. Identify Ipv4 and Ipv6 addresses and their default subnet masks. 2. Identify the differences between public.
Advertisements

IT-320 Chapter 1 Introduction to Networks. Objectives 1. Differentiate between LANs, MANs, and WANs. 2. List and describe the components that make up.
IT-320Chapter 9 WAN Technology. Objectives 1. Identify the purpose, features, and functions of the CSU/DSU, Modem, and ISDN adapters. 2. Compare and contrast.
IT-320Chapter 17 Voice Communications. Objectives 1. Explain how DS-0 relates to a voice communication channel. 2. Describe the hierarchy used with the.
Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Water Supply and Pollution Control, Eighth Edition.
Reinforced Concrete: A Fundamental Approach, Sixth Edition By Edward G. Nawy Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey.
IT-320Chapter 10 Packet Switching Networks. Objectives 1. Compare and contrast X.25 and Frame Relay networks. 2. Explain the need for SLAs and define.
Figure 2–1 Illustration of a simple binary counting application. Thomas L. Floyd Digital Fundamentals, 9e Copyright ©2006 by Pearson Education, Inc. Upper.
Chapter 1 The Facts to Be Explained. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 1-2.
Copyright © 2006 Pearson Addison-Wesley. All rights reserved. Chapter 18 Conclusion: Where We Stand.
Chapter 1 Computer Networks and the Internet. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 1-2.
Chapter 6 Wireless and Mobile Networks. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 6-2.
©2002 Pearson Education, Inc. Upper Saddle River, New Jersey THE NATURE AND PROPERTIES OF SOILS, 13/e Nyle C. Brady and Ray R. Weil Chapter 8 The.
Chapter 7 Multimedia Networking. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 7-2.
Floyd Digital Fundamentals, 9/e Copyright ©2006 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Slide 1 Digital Fundamentals.
Figure 12.1 Possible Room Arrangement Bill Harp and Jo Ann Brewer The Informed Reading Teacher: Research- Based Practice Copyright ©2005 by Pearson Education,
Chapter 6 Network Design and Trouble- Shooting Scenarios
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Chapter 3 Networking Hardware Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Chapter Cost-Benefit Analysis Concepts and Practice.
Chapter 11 Network Management and Security Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc.
Figure 6.1 Horace Mann Strategies Checklist Bill Harp and Jo Ann Brewer The Informed Reading Teacher: Research- Based Practice Copyright ©2005 by Pearson.
Chapter 1 What is a Computer Network? Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper.
Figure 8--3 The Five Comprehension Subprocesses Gail E. Tompkins Literacy for the 21st Century, 3e Copyright ©2003 by Pearson Education, Inc. Upper Saddle.
FIGURE 8-1 Generic I/O Subsystems Peter Spasov Microcontroller Technology: The 68HC11, Fourth Edition Copyright ©2002 by Pearson Education, Inc. Upper.
Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Water Supply and Pollution Control, Eighth Edition.
Chapter 15 The Internet Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle River,
Figure 1--1 The Four Learning Theories Gail E. Tompkins Literacy for the 21st Century, 3e Copyright ©2003 by Pearson Education, Inc. Upper Saddle River,
Chapter 14 Multimedia Networking Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle.
Figure 14.1 Room Arrangement Bill Harp and Jo Ann Brewer The Informed Reading Teacher: Research- Based Practice Copyright ©2005 by Pearson Education, Inc.
FIGURE 7.1 Introducing the reduce and return approach. Robert L. Boylestad Introductory Circuit Analysis, 10ed. Copyright ©2003 by Pearson Education, Inc.
Figure Materials in Basal Reading Programs Gail E. Tompkins Literacy for the 21st Century, 3e Copyright ©2003 by Pearson Education, Inc. Upper Saddle.
Figure 10.1 Recursive Model of the Writing Process Bill Harp and Jo Ann Brewer The Informed Reading Teacher: Research- Based Practice Copyright ©2005 by.
Figure 3--1 Options for organizing information Pfeiffer Technical Writing, 5ed. Copyright ©2003 by Pearson Education, Inc. Upper Saddle River, New Jersey.
Figure 13.1 Balanced Reading Program Bill Harp and Jo Ann Brewer The Informed Reading Teacher: Research- Based Practice Copyright ©2005 by Pearson Education,
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Chapter Cost-Benefit Analysis Concepts and Practice.
Figure A--1 Thomas L. Floyd Digital Fundamentals, 8e Copyright ©2003 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Chapter Cost-Benefit Analysis Concepts and Practice.
FIGURE 6.1 Parallel elements. Robert L. Boylestad Introductory Circuit Analysis, 10ed. Copyright ©2003 by Pearson Education, Inc. Upper Saddle River, New.
Figure 7.1 Categories Grid Bill Harp and Jo Ann Brewer The Informed Reading Teacher: Research- Based Practice Copyright ©2005 by Pearson Education, Inc.
Figure 2--2 Key Features of the Reading Process Gail E. Tompkins Literacy for the 21st Century, 3e Copyright ©2003 by Pearson Education, Inc. Upper Saddle.
Floyd Digital Fundamentals, 9/e Copyright ©2006 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Slide 1 Digital Fundamentals.
Chapter 17 Windows NT/2000 Domains Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Twelve Network Security.
Chapter 7 Low Level Protocols Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle.
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 15.1 Collaborative Professional Development
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 45: Drugs for Muscle Spasms and Spasticity
Chapter 37: Drugs for Bowel Disorders, Nausea, and Vomiting
Figure 4--2 Mrs. Mast’s Unit Plan for “The Three Bears”
Chapter 24: Drugs for Coagulation Disorders
Copyright © 2012, Elsevier Inc. All rights Reserved.
Figure 15.1 Collaborative Professional Development
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 47: Drugs for Skin Disorders
Chapter 43: Drugs for Renal Disorders and Diuretic Therapy
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Section 10.5 The Dot Product
Modeling Functionality with Use Cases
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 19: Drugs for the Control of Pain
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 15 Contraception
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 20 Assisted Reproductive Technologies
Presentation transcript:

IT-320 Chapter 16 Network Security

Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario, determine what the threat and vulnerabilities are and decide how to protect your network from them. 3. List and define the different types of firewalls available and explain how each protects its network. 4. Given a scenario, determine how you would use a DMZ. 5. Compare and contrast private keys and public key encryption. 6. Compare and contrast digital envelopes, digital signatures, and certificates. 7. Explain how hash encryption protects data. 8. Explain how patches can improve network security.

FIGURE 16-1 Types of Attacks as They Relate to the OSI Model Patrick Regan Wide Area Networks Copyright ©2004 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.

FIGURE 16-2 Configuring the Proxy Selection and Proxy Bypass Settings in Internet Explorer Patrick Regan Wide Area Networks Copyright ©2004 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. a bc

FIGURE 16-3 Configuring the Proxy Settings for Netscape Patrick Regan Wide Area Networks Copyright ©2004 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.

FIGURE 16-4 A DMZ Patrick Regan Wide Area Networks Copyright ©2004 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.

FIGURE 16-5 An ESP Datagram Patrick Regan Wide Area Networks Copyright ©2004 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.