SlideShare ist ein Scribd-Unternehmen logo
1 von 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Objectives


                  In this session, you will learn to:
                     Identify methods for securing wireless communications.
                     Identify appropriate responses to social engineering attacks.
                     Install and configure security measures.
                     Maintain and troubleshoot security measures.




       Ver. 1.0                      Session 15                              Slide 1 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Wireless Security


                  Increase in the number of wireless computing devices has
                  given rise to the need for protecting wireless network
                  communications.




       Ver. 1.0                   Session 15                         Slide 2 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Wireless Encryption Methods


                  The protocols that are available to encrypt and secure
                  wireless communications are:
                      WEP
                      WTLS
                      802.1x
                      WPA
                      802.11i




       Ver. 1.0                    Session 15                          Slide 3 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Security Methods for Wireless Access Points


                  The methods that increase the security on wireless access
                  points are:
                     User authentication
                     Data encryption
                     Anitvirus software
                     Security patches
                     MAC filters
                     Static IP
                     Use firewall
                     Change default username
                     Alter or disable SSID
                     Configure vendor’s security settings




       Ver. 1.0                     Session 15                       Slide 4 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Wireless Client Configuration Options


                  The options for increasing the security on wireless clients
                  are:
                   •   Data encryption
                   •   Antivirus software
                   •   Security patches
                   •   Secure the wireless access point.




       Ver. 1.0                       Session 15                        Slide 5 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Social Engineering


                  •   Social engineering is a technique used to obtain
                      confidential information by manipulating the computer
                      system users.




       Ver. 1.0                        Session 15                         Slide 6 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Social Engineering Attacks


                  •   A social engineering attack is a type of attack that uses
                      the steps to gather information from users:
                      1.   Attacker obtains credentials from user
                      2.   Attacker uses credentials to mount attack




                                         1

                                               User name
                                               Password


                                         2

                             Attacker




                                                           Target




       Ver. 1.0                         Session 15                       Slide 7 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Social Engineering Prevention


                  The most effective way to prevent damage from social
                  engineering attacks is to train individuals to recognize and
                  respond to these attacks properly.
                  Types of biometrics are:
                      Fingerprint scan
                      Retinal scan
                      Voice recognition
                      Face recognition
                      Biometric authentication token




       Ver. 1.0                     Session 15                          Slide 8 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Install and Configure Security Measures


                  To implement the appropriate security measures you must
                  first install and configure security measures.
                  As a computer support technician you will need to have the
                  security knowledge and skills to install the proper measures
                  so that systems are protected and users can access the
                  resources they need.




       Ver. 1.0                    Session 15                          Slide 9 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Windows Security Policies


                  •   Windows security policies are Windows configuration
                      settings that control the overall security behavior of the
                      system.     Policies set centrally
                                           for computer




                                                                            Configuratio
                                                                             n settings




                       Security Settings
                        node in policy
                            object




       Ver. 1.0                                   Session 15                 Slide 10 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Windows Firewall


                  •   Windows Firewall is a software-based firewall available
                      with Service Pack 2 for Windows XP.




       Ver. 1.0                        Session 15                        Slide 11 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Software Firewall Configuration Settings


                  •   Most software-based firewalls offer configuration settings for
                      common security options, such as:
                          Global security level
                          Application access
                          Security log
                          Unsolicited traffic blocking




       Ver. 1.0                           Session 15                        Slide 12 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Computer Security Measures


                  When you select and apply computer security measures,
                  you must:
                     Protect system
                     Protect applications and data
                     Permit legitimate access




       Ver. 1.0                    Session 15                      Slide 13 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Activity 15-1




                        Activity on Configuring
                        Windows Firewall




       Ver. 1.0                Session 15                       Slide 14 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Activity 15-2




                        Activity on Configuring
                        NTFS Permissions




       Ver. 1.0                Session 15                       Slide 15 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Activity 15-3




                        Activity on Using File
                        Encryption




       Ver. 1.0                Session 15                       Slide 16 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Maintaining and Troubleshooting Security Measures


                  •   System security is a ongoing process, so once the security
                      measures are installed they must be maintained to:
                          To avoid attacks.
                          Troubleshoot in response to user access problems.
                          Address directly or escalate.




       Ver. 1.0                          Session 15                                Slide 17 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Common Computer Security Issues


                  The common computer security issues are:
                     BIOS security
                     Biometric security
                     Authentication
                     Malicious software
                     File system security
                     Data access issues
                     Backup security




       Ver. 1.0                     Session 15                  Slide 18 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Common Software Firewall Issues


                  •   The common software firewall issues are:
                         Disabling
                         Open ports
                         LAN and VPN traffic
                         Firewall conflicts
                         Program dependencies
                         Outgoing traffic
                         User errors




       Ver. 1.0                       Session 15                 Slide 19 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Common Wireless Client Configuration Issues


                  The common wireless client configuration issues are:
                     Protocol compatibility
                     WEP
                     SSL on WAP
                     Buffer overflow
                     Viruses
                     Data in plain text
                     Lack of authentication
                     Site surveys
                     Unused connections




       Ver. 1.0                     Session 15                       Slide 20 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Common Encryption Issues


                  •   The common encryption issues are:
                         Effectiveness of encryption:
                          • Computational power
                          • Size of encryption key
                          • New attacks and exploits
                         Problems with encryption:
                          • Lost or corrupted keys
                          • User does not own data




       Ver. 1.0                         Session 15              Slide 21 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Summary


                  In this session, you learned that :
                      Protecting wireless communications is necessary to have an
                      secure wireless communication.
                      Social engineering is a technique used to obtain confidential
                      information by manipulating the users of computer system.
                      The measures that are necessary to be taken to prevent social
                      engineering attacks.
                      The steps taken to install and configure security measures.
                      The issues to be considered for maintaining and
                      troubleshooting security measures.




       Ver. 1.0                     Session 15                            Slide 22 of 22

Weitere ähnliche Inhalte

Was ist angesagt?

Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02Niit Care
 
Comp tia n+_session_05
Comp tia n+_session_05Comp tia n+_session_05
Comp tia n+_session_05Niit Care
 
Comp tia n+_session_01
Comp tia n+_session_01Comp tia n+_session_01
Comp tia n+_session_01Niit Care
 
Comp tia n+_session_06
Comp tia n+_session_06Comp tia n+_session_06
Comp tia n+_session_06Niit Care
 
Comp tia n+_intro_session
Comp tia n+_intro_sessionComp tia n+_intro_session
Comp tia n+_intro_sessionNiit Care
 
Comp tia a+_session_11
Comp tia a+_session_11Comp tia a+_session_11
Comp tia a+_session_11Niit Care
 
Comp tia a+_session_02
Comp tia a+_session_02Comp tia a+_session_02
Comp tia a+_session_02Niit Care
 
Comp tia n+_session_03
Comp tia n+_session_03Comp tia n+_session_03
Comp tia n+_session_03Niit Care
 
Comp tia a+_session_05
Comp tia a+_session_05Comp tia a+_session_05
Comp tia a+_session_05Niit Care
 
Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Houcheng Lee
 
13.30 hr Hebinck
13.30 hr Hebinck13.30 hr Hebinck
13.30 hr HebinckThemadagen
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionSenetas
 
Skype testing overview
Skype testing overviewSkype testing overview
Skype testing overviewQA Club Kiev
 
Update on Video Conferencing
Update on Video ConferencingUpdate on Video Conferencing
Update on Video ConferencingVideoguy
 
Singularity Rethinking The Software Stack
Singularity    Rethinking The  Software  StackSingularity    Rethinking The  Software  Stack
Singularity Rethinking The Software Stackalanocu
 
Staying ahead of the multi-core revolution with CDT debug
Staying ahead of the multi-core revolution with CDT debugStaying ahead of the multi-core revolution with CDT debug
Staying ahead of the multi-core revolution with CDT debugmarckhouzam
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
Intel vmcs-shadowing-paper
Intel vmcs-shadowing-paperIntel vmcs-shadowing-paper
Intel vmcs-shadowing-paperAhmed Sallam
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10Yustinus Malawau
 

Was ist angesagt? (20)

Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02
 
Comp tia n+_session_05
Comp tia n+_session_05Comp tia n+_session_05
Comp tia n+_session_05
 
Comp tia n+_session_01
Comp tia n+_session_01Comp tia n+_session_01
Comp tia n+_session_01
 
Comp tia n+_session_06
Comp tia n+_session_06Comp tia n+_session_06
Comp tia n+_session_06
 
Comp tia n+_intro_session
Comp tia n+_intro_sessionComp tia n+_intro_session
Comp tia n+_intro_session
 
Comp tia a+_session_11
Comp tia a+_session_11Comp tia a+_session_11
Comp tia a+_session_11
 
Comp tia a+_session_02
Comp tia a+_session_02Comp tia a+_session_02
Comp tia a+_session_02
 
Comp tia n+_session_03
Comp tia n+_session_03Comp tia n+_session_03
Comp tia n+_session_03
 
Comp tia a+_session_05
Comp tia a+_session_05Comp tia a+_session_05
Comp tia a+_session_05
 
Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)
 
13.30 hr Hebinck
13.30 hr Hebinck13.30 hr Hebinck
13.30 hr Hebinck
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
 
Skype testing overview
Skype testing overviewSkype testing overview
Skype testing overview
 
Update on Video Conferencing
Update on Video ConferencingUpdate on Video Conferencing
Update on Video Conferencing
 
Singularity Rethinking The Software Stack
Singularity    Rethinking The  Software  StackSingularity    Rethinking The  Software  Stack
Singularity Rethinking The Software Stack
 
Staying ahead of the multi-core revolution with CDT debug
Staying ahead of the multi-core revolution with CDT debugStaying ahead of the multi-core revolution with CDT debug
Staying ahead of the multi-core revolution with CDT debug
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
Moderne device management door middel van cloud
Moderne device management door middel van cloudModerne device management door middel van cloud
Moderne device management door middel van cloud
 
Intel vmcs-shadowing-paper
Intel vmcs-shadowing-paperIntel vmcs-shadowing-paper
Intel vmcs-shadowing-paper
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10
 

Ähnlich wie Comp tia a+_session_15

Comp tia a+_session_14
Comp tia a+_session_14Comp tia a+_session_14
Comp tia a+_session_14Niit Care
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierCTE Solutions Inc.
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Comp tia a+_session_04
Comp tia a+_session_04Comp tia a+_session_04
Comp tia a+_session_04Niit Care
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)José Ferreiro
 
Comp tia a+_session_09
Comp tia a+_session_09Comp tia a+_session_09
Comp tia a+_session_09Niit Care
 
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld
 
CoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And DataCoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And DataCoreTrace Corporation
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Jan Ketil Skanke
 
Comp tia a+_session_12
Comp tia a+_session_12Comp tia a+_session_12
Comp tia a+_session_12Niit Care
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02frank4dd
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeLOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeYusuf Hadiwinata Sutandar
 
Microsoft Windows 10 for the Enterprise
Microsoft Windows 10 for the EnterpriseMicrosoft Windows 10 for the Enterprise
Microsoft Windows 10 for the EnterpriseDavid J Rosenthal
 
DigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and BenefitsDigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and BenefitsCodeSigningStore
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 

Ähnlich wie Comp tia a+_session_15 (20)

Comp tia a+_session_14
Comp tia a+_session_14Comp tia a+_session_14
Comp tia a+_session_14
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Comp tia a+_session_04
Comp tia a+_session_04Comp tia a+_session_04
Comp tia a+_session_04
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 
Comp tia a+_session_09
Comp tia a+_session_09Comp tia a+_session_09
Comp tia a+_session_09
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
 
CoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And DataCoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And Data
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
 
Comp tia a+_session_12
Comp tia a+_session_12Comp tia a+_session_12
Comp tia a+_session_12
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeLOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
 
INT 1010 05-1.pdf
INT 1010 05-1.pdfINT 1010 05-1.pdf
INT 1010 05-1.pdf
 
Microsoft Windows 10 for the Enterprise
Microsoft Windows 10 for the EnterpriseMicrosoft Windows 10 for the Enterprise
Microsoft Windows 10 for the Enterprise
 
DigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and BenefitsDigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and Benefits
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 

Mehr von Niit Care (20)

Ajs 1 b
Ajs 1 bAjs 1 b
Ajs 1 b
 
Ajs 4 b
Ajs 4 bAjs 4 b
Ajs 4 b
 
Ajs 4 a
Ajs 4 aAjs 4 a
Ajs 4 a
 
Ajs 4 c
Ajs 4 cAjs 4 c
Ajs 4 c
 
Ajs 3 b
Ajs 3 bAjs 3 b
Ajs 3 b
 
Ajs 3 a
Ajs 3 aAjs 3 a
Ajs 3 a
 
Ajs 3 c
Ajs 3 cAjs 3 c
Ajs 3 c
 
Ajs 2 b
Ajs 2 bAjs 2 b
Ajs 2 b
 
Ajs 2 a
Ajs 2 aAjs 2 a
Ajs 2 a
 
Ajs 2 c
Ajs 2 cAjs 2 c
Ajs 2 c
 
Ajs 1 a
Ajs 1 aAjs 1 a
Ajs 1 a
 
Ajs 1 c
Ajs 1 cAjs 1 c
Ajs 1 c
 
Dacj 4 2-c
Dacj 4 2-cDacj 4 2-c
Dacj 4 2-c
 
Dacj 4 2-b
Dacj 4 2-bDacj 4 2-b
Dacj 4 2-b
 
Dacj 4 2-a
Dacj 4 2-aDacj 4 2-a
Dacj 4 2-a
 
Dacj 4 1-c
Dacj 4 1-cDacj 4 1-c
Dacj 4 1-c
 
Dacj 4 1-b
Dacj 4 1-bDacj 4 1-b
Dacj 4 1-b
 
Dacj 4 1-a
Dacj 4 1-aDacj 4 1-a
Dacj 4 1-a
 
Dacj 1-2 b
Dacj 1-2 bDacj 1-2 b
Dacj 1-2 b
 
Dacj 1-3 c
Dacj 1-3 cDacj 1-3 c
Dacj 1-3 c
 

Kürzlich hochgeladen

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Kürzlich hochgeladen (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Comp tia a+_session_15

  • 1. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Objectives In this session, you will learn to: Identify methods for securing wireless communications. Identify appropriate responses to social engineering attacks. Install and configure security measures. Maintain and troubleshoot security measures. Ver. 1.0 Session 15 Slide 1 of 22
  • 2. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Wireless Security Increase in the number of wireless computing devices has given rise to the need for protecting wireless network communications. Ver. 1.0 Session 15 Slide 2 of 22
  • 3. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Wireless Encryption Methods The protocols that are available to encrypt and secure wireless communications are: WEP WTLS 802.1x WPA 802.11i Ver. 1.0 Session 15 Slide 3 of 22
  • 4. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Security Methods for Wireless Access Points The methods that increase the security on wireless access points are: User authentication Data encryption Anitvirus software Security patches MAC filters Static IP Use firewall Change default username Alter or disable SSID Configure vendor’s security settings Ver. 1.0 Session 15 Slide 4 of 22
  • 5. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Wireless Client Configuration Options The options for increasing the security on wireless clients are: • Data encryption • Antivirus software • Security patches • Secure the wireless access point. Ver. 1.0 Session 15 Slide 5 of 22
  • 6. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Social Engineering • Social engineering is a technique used to obtain confidential information by manipulating the computer system users. Ver. 1.0 Session 15 Slide 6 of 22
  • 7. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Social Engineering Attacks • A social engineering attack is a type of attack that uses the steps to gather information from users: 1. Attacker obtains credentials from user 2. Attacker uses credentials to mount attack 1 User name Password 2 Attacker Target Ver. 1.0 Session 15 Slide 7 of 22
  • 8. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Social Engineering Prevention The most effective way to prevent damage from social engineering attacks is to train individuals to recognize and respond to these attacks properly. Types of biometrics are: Fingerprint scan Retinal scan Voice recognition Face recognition Biometric authentication token Ver. 1.0 Session 15 Slide 8 of 22
  • 9. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Install and Configure Security Measures To implement the appropriate security measures you must first install and configure security measures. As a computer support technician you will need to have the security knowledge and skills to install the proper measures so that systems are protected and users can access the resources they need. Ver. 1.0 Session 15 Slide 9 of 22
  • 10. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Windows Security Policies • Windows security policies are Windows configuration settings that control the overall security behavior of the system. Policies set centrally for computer Configuratio n settings Security Settings node in policy object Ver. 1.0 Session 15 Slide 10 of 22
  • 11. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Windows Firewall • Windows Firewall is a software-based firewall available with Service Pack 2 for Windows XP. Ver. 1.0 Session 15 Slide 11 of 22
  • 12. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Software Firewall Configuration Settings • Most software-based firewalls offer configuration settings for common security options, such as: Global security level Application access Security log Unsolicited traffic blocking Ver. 1.0 Session 15 Slide 12 of 22
  • 13. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Computer Security Measures When you select and apply computer security measures, you must: Protect system Protect applications and data Permit legitimate access Ver. 1.0 Session 15 Slide 13 of 22
  • 14. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Activity 15-1 Activity on Configuring Windows Firewall Ver. 1.0 Session 15 Slide 14 of 22
  • 15. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Activity 15-2 Activity on Configuring NTFS Permissions Ver. 1.0 Session 15 Slide 15 of 22
  • 16. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Activity 15-3 Activity on Using File Encryption Ver. 1.0 Session 15 Slide 16 of 22
  • 17. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Maintaining and Troubleshooting Security Measures • System security is a ongoing process, so once the security measures are installed they must be maintained to: To avoid attacks. Troubleshoot in response to user access problems. Address directly or escalate. Ver. 1.0 Session 15 Slide 17 of 22
  • 18. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Common Computer Security Issues The common computer security issues are: BIOS security Biometric security Authentication Malicious software File system security Data access issues Backup security Ver. 1.0 Session 15 Slide 18 of 22
  • 19. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Common Software Firewall Issues • The common software firewall issues are: Disabling Open ports LAN and VPN traffic Firewall conflicts Program dependencies Outgoing traffic User errors Ver. 1.0 Session 15 Slide 19 of 22
  • 20. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Common Wireless Client Configuration Issues The common wireless client configuration issues are: Protocol compatibility WEP SSL on WAP Buffer overflow Viruses Data in plain text Lack of authentication Site surveys Unused connections Ver. 1.0 Session 15 Slide 20 of 22
  • 21. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Common Encryption Issues • The common encryption issues are: Effectiveness of encryption: • Computational power • Size of encryption key • New attacks and exploits Problems with encryption: • Lost or corrupted keys • User does not own data Ver. 1.0 Session 15 Slide 21 of 22
  • 22. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Summary In this session, you learned that : Protecting wireless communications is necessary to have an secure wireless communication. Social engineering is a technique used to obtain confidential information by manipulating the users of computer system. The measures that are necessary to be taken to prevent social engineering attacks. The steps taken to install and configure security measures. The issues to be considered for maintaining and troubleshooting security measures. Ver. 1.0 Session 15 Slide 22 of 22

Hinweis der Redaktion

  1. You need to tell what is a wireless access point.