Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security Fundamentals

Similar presentations


Presentation on theme: "Computer Security Fundamentals"— Presentation transcript:

1 Computer Security Fundamentals
by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

2 Chapter 11 Objectives Understand how to secure a system
Probe a system for vulnerabilities Use Vulnerability vulnerability scanning tools Evaluate potential security consultants Understand and be able to conduct basic system reconnaissance. Describe and use several port scanners. Understand how to derive useful information about a Web site from internic or the Netcraft Web site. Know how to locate useful information about a system or organization from Internet newsgroup postings. Understand the use of vulnerability scanners. Use port monitoring utilities. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

3 Introduction Secure the system.
The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

4 Basics of Security Ports Protect Policies Probe Physical
The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

5 MBSA Microsoft Baseline Security Analyzer
The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

6 Nessus Popular Vulnerability Scanner
The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

7 Getting Professional Help
Certification Education Experience Background Checks The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

8 Certifications CEH CISSP Security+
Vendor-specific (Microsoft, Cisco, and so on) GAIC © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

9 Education Computer Science Engineering Computer Information Systems
Security Degrees © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

10 Background and Experience
Prior Security Experience Criminal Background Check Credit Check References Check © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

11 Summary Information The more information you have about the vulnerabilities and weaknesses of your system, the better prepared you are to defend it. The more information the hacker has about your system’s vulnerabilities and weaknesses, the sooner it will be violated. The tools in this chapter are for the network and security administrator and are to be used for legal, not illegal, purposes. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning


Download ppt "Computer Security Fundamentals"

Similar presentations


Ads by Google