SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Basic Security



              Networking for Home and Small Businesses – Chapter
              8




Version 4.0                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   1
Objectives
   Identify and describe the various networking threats.
   Identify different methods of attack.
   Describe security procedures and applications.
   Describe the features of a firewall and how it can be
    used to protect against an attack.




                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   2
Networking Threats
 Describe major risks of network intrusion




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   3
Networking Threats
 Define the sources of network intrusion.




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   4
Networking Threats
 Describe social engineering and phishing




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   5
Methods of Attack
 Describe viruses, worms, and Trojan horses.




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   6
Methods of Attack
 Denial of Service and Brute Force attacks




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   7
Methods of Attack
 Describe spyware, tracking cookies, adware and pop-
  ups.




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   8
Methods of Attack
 Describe Spam




                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   9
Security Procedures and Applications
 Defining a security policy




                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   10
Security Procedures and Applications
 Define common security procedures




                          © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   11
Security Procedures and Applications
 Describe how updates and patches relate to security
  issues.




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   12
Security Procedures and Applications
 Anti-virus software




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   13
Security Procedures and Applications
 SPAM prevention




                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   14
Security Procedures and Applications
 Anti-Spyware




                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   15
Firewall Features and How to Use them to
Protect Against an Attack
 What is a firewall?




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   16
Firewall Features and How to Use them to
Protect Against an Attack
 Using a Firewall to Protect Against an Attack




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   17
Firewall Features and How to Use them to
Protect Against an Attack
 Vulnerability Analysis




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   18
Firewall Features and How to Use them to
Protect Against an Attack
 Security Best Practices




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   19
Summary
 Networks can be open to intrusion through
  vulnerabilities in software, hardware attacks, or the
  weaknesses of individuals.
 Effective network security is based on a variety of
  products and services, combined with a thorough
  security policy.
 A firewall controls traffic between networks and helps
  prevent unauthorized access.




                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   20
© 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   21

Weitere ähnliche Inhalte

Was ist angesagt?

CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4Irsandi Hasan
 
CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3Irsandi Hasan
 
CCNA Discovery 1 - Chapter 6
CCNA Discovery 1 - Chapter 6CCNA Discovery 1 - Chapter 6
CCNA Discovery 1 - Chapter 6Irsandi Hasan
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewlulunannisa
 
Discovery smb isp_chapter1
Discovery smb isp_chapter1Discovery smb isp_chapter1
Discovery smb isp_chapter1idzwanpsis
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1Ali Kamil
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1Irsandi Hasan
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1jdb1979
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Sachii Dosti
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1r82093403
 
Exploration network
Exploration networkExploration network
Exploration networkchtiiara
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 

Was ist angesagt? (20)

CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3
 
CCNA Discovery 1 - Chapter 6
CCNA Discovery 1 - Chapter 6CCNA Discovery 1 - Chapter 6
CCNA Discovery 1 - Chapter 6
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Discovery smb isp_chapter1
Discovery smb isp_chapter1Discovery smb isp_chapter1
Discovery smb isp_chapter1
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1
 
CCNA Icnd110 s00
CCNA Icnd110 s00CCNA Icnd110 s00
CCNA Icnd110 s00
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA Icnd110 s01l02
CCNA Icnd110 s01l02CCNA Icnd110 s01l02
CCNA Icnd110 s01l02
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1
 
Exploration network
Exploration networkExploration network
Exploration network
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
ccna1 v5 cap2
ccna1 v5 cap2ccna1 v5 cap2
ccna1 v5 cap2
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
IPsec
IPsecIPsec
IPsec
 

Andere mochten auch

CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 7CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 7Irsandi Hasan
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4Irsandi Hasan
 
CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9Irsandi Hasan
 
CCNA Discovery 2 - Chapter 6
CCNA Discovery 2 - Chapter 6CCNA Discovery 2 - Chapter 6
CCNA Discovery 2 - Chapter 6Irsandi Hasan
 
CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5Irsandi Hasan
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1Irsandi Hasan
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 

Andere mochten auch (9)

CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 7CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 7
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4
 
CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9
 
CCNA Discovery 2 - Chapter 6
CCNA Discovery 2 - Chapter 6CCNA Discovery 2 - Chapter 6
CCNA Discovery 2 - Chapter 6
 
CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 

Ähnlich wie CCNA Discovery 1 - Chapter 8

CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4Irsandi Hasan
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securitymysoria
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solutionxKinAnx
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptxJohn572978
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1Irsandi Hasan
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop securityRobert Albach
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hDave Arvin
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Mukesh Chinta
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsTiago Monteiro
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Hamza Malik
 

Ähnlich wie CCNA Discovery 1 - Chapter 8 (20)

CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4
 
IT Essentials Chapter 9
IT Essentials Chapter 9IT Essentials Chapter 9
IT Essentials Chapter 9
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
BYOD without Compromise
BYOD without CompromiseBYOD without Compromise
BYOD without Compromise
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solution
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop security
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_h
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Ite pc v40_chapter9
Ite pc v40_chapter9Ite pc v40_chapter9
Ite pc v40_chapter9
 
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
 

Mehr von Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10Irsandi Hasan
 

Mehr von Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 

Kürzlich hochgeladen

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Kürzlich hochgeladen (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

CCNA Discovery 1 - Chapter 8

  • 1. Basic Security Networking for Home and Small Businesses – Chapter 8 Version 4.0 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives  Identify and describe the various networking threats.  Identify different methods of attack.  Describe security procedures and applications.  Describe the features of a firewall and how it can be used to protect against an attack. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Networking Threats  Describe major risks of network intrusion © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Networking Threats  Define the sources of network intrusion. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Networking Threats  Describe social engineering and phishing © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Methods of Attack  Describe viruses, worms, and Trojan horses. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Methods of Attack  Denial of Service and Brute Force attacks © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Methods of Attack  Describe spyware, tracking cookies, adware and pop- ups. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Methods of Attack  Describe Spam © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Security Procedures and Applications  Defining a security policy © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Security Procedures and Applications  Define common security procedures © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Security Procedures and Applications  Describe how updates and patches relate to security issues. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Security Procedures and Applications  Anti-virus software © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Security Procedures and Applications  SPAM prevention © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Security Procedures and Applications  Anti-Spyware © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Firewall Features and How to Use them to Protect Against an Attack  What is a firewall? © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Firewall Features and How to Use them to Protect Against an Attack  Using a Firewall to Protect Against an Attack © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Firewall Features and How to Use them to Protect Against an Attack  Vulnerability Analysis © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Firewall Features and How to Use them to Protect Against an Attack  Security Best Practices © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Summary  Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals.  Effective network security is based on a variety of products and services, combined with a thorough security policy.  A firewall controls traffic between networks and helps prevent unauthorized access. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21