Presentation is loading. Please wait.

Presentation is loading. Please wait.

IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,

Similar presentations


Presentation on theme: "IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,"— Presentation transcript:

1 IT-320 Chapter 16 Network Security

2 Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario, determine what the threat and vulnerabilities are and decide how to protect your network from them. 3. List and define the different types of firewalls available and explain how each protects its network. 4. Given a scenario, determine how you would use a DMZ. 5. Compare and contrast private keys and public key encryption. 6. Compare and contrast digital envelopes, digital signatures, and certificates. 7. Explain how hash encryption protects data. 8. Explain how patches can improve network security.

3 FIGURE 16-1 Types of Attacks as They Relate to the OSI Model Patrick Regan Wide Area Networks Copyright ©2004 by Pearson Education, Inc. Upper Saddle River, New Jersey 07458 All rights reserved.

4 FIGURE 16-2 Configuring the Proxy Selection and Proxy Bypass Settings in Internet Explorer Patrick Regan Wide Area Networks Copyright ©2004 by Pearson Education, Inc. Upper Saddle River, New Jersey 07458 All rights reserved. a bc

5 FIGURE 16-3 Configuring the Proxy Settings for Netscape Patrick Regan Wide Area Networks Copyright ©2004 by Pearson Education, Inc. Upper Saddle River, New Jersey 07458 All rights reserved.

6 FIGURE 16-4 A DMZ Patrick Regan Wide Area Networks Copyright ©2004 by Pearson Education, Inc. Upper Saddle River, New Jersey 07458 All rights reserved.

7 FIGURE 16-5 An ESP Datagram Patrick Regan Wide Area Networks Copyright ©2004 by Pearson Education, Inc. Upper Saddle River, New Jersey 07458 All rights reserved.


Download ppt "IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,"

Similar presentations


Ads by Google