SlideShare ist ein Scribd-Unternehmen logo
1 von 46
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Objectives


                 In this session, you will learn to:
                     Identify network authentication methods.
                     Identify major data encryption methods and
                     technologies.
                     Identify the primary techniques used to secure Internet
                     connections.
                     Identify the major architectures in remote networking
                     implementations.
                     Identify common terminal services network
                     implementations.




      Ver. 1.0                     Session 9                          Slide 1 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Network Authentication Methods


                 In a network environment, the security settings control how
                 users and computers authenticate to the network.
                 Authentication is the first line of defense against attack or
                 intrusion into network systems.
                 The various network authentication methods are:
                     Strong Passwords
                     Kerberos
                     Extensible Authentication Protocol (EAP)




      Ver. 1.0                      Session 9                           Slide 2 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Strong Passwords


                 •   A strong password is a password that meets complexity
                     requirements that are set by a system administrator and
                     documented in a password policy by specifying:
                                                            Minimum length




                      Special characters   !Pass1234
                                           Uppercase
                                             letters                         Numbers


                                                       Lowercase letters



                 •   Authentication based entirely on a user name/password
                     combination is sometimes called authentication by
                     assertion.


      Ver. 1.0                                Session 9                                Slide 3 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Kerberos


                 •   Kerberos is an Internet standard authentication protocol
                     that links a user name and password to an authority that
                     can certify that the user is valid and also verify the user’s
                     ability to access resources.
                                                                KAS




                                              Authenticates
                                                                           Trusts KAS
                                                with KAS




                                                            Uses credentials
                                                          to access resources

                                                                                        Resource
                                     User01                                              server




      Ver. 1.0                           Session 9                                                 Slide 4 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 The Kerberos Process


                 A Kerberos client uses a Kerberos authentication process to
                 establish a secure connection with a service.
                                            1



                                                     Credentials
                                            2


                                                                   KAS
                       User01                            TGT
                           5                3


                                                         TGT
                                            4

                      Session
                                                       Session




                       Resource server




      Ver. 1.0                           Session 9                       Slide 5 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Extensible Authentication Protocol (EAP)


                 •   Extensible Authentication Protocol (EAP) is an
                     authentication protocol that enables systems to use
                     hardware-based identifiers, such as fingerprint scanners or
                     smart card readers, for authentication.


                                  EAP enables hardware-based authentication




                                                       Fingerprint scanner




                                                       Smart card reader




      Ver. 1.0                            Session 9                           Slide 6 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Activity 11-4




                           Activity Examining
                           Strong Passwords




      Ver. 1.0                 Session 9                      Slide 7 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Data Encryption


                 •   Data encryption is a way to secure client information.
                 •   The various data encryption methods and technologies are:
                        Key-Based Encryption Systems
                        Data Encryption Standard (DES)
                        Digital Certificates
                        Public Key Infrastructure (PKI)
                        The Certificate Encryption Process
                        The Certificate Authentication Process
                        IP Security (IPSec)
                        IPSec Levels
                        IPSec Policies
                        Secure Sockets Layer (SSL)
                        The SSL Process


      Ver. 1.0                         Session 9                       Slide 8 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Key-Based Encryption Systems


                 •   Key-based encryption system uses a key to control how
                     information is encoded and decoded.
                 •   Types of key-based encryption:
                        Shared-key or symmetric system
                        Key-pair or asymmetric system with two keys:
                         • A public key
                         • A private key
                        The following figure depicts the shared-key encryption system:




                                Encrypts data                        Decrypts
                                                                       data


                                                    Same key on both sides

      Ver. 1.0                              Session 9                           Slide 9 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Key-Based Encryption Systems (Contd.)


                              The following figure depicts the private-key encryption
                              system:
                                                     1       Exchange public keys




                                                                 Public key A




                                          Computer A                                    Computer B
                                                                 Public key B




                     2   Data encrypted using public key B                          3     Data decrypted with private key B




                 Computer A                              Computer B             Computer A                        Computer B


      Ver. 1.0                                  Session 9                                                                 Slide 10 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Activity 11-5




                        Encrypting Data with EFS




      Ver. 1.0                 Session 9                      Slide 11 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Data Encryption Standard (DES)


                 •   DES is a shared-key encryption standard that is based on a
                     56-bit encryption key that includes an additional 8 parity
                     bits.
                                          56 bits                  8 parity bits




                                                Shared DES key

                                                      Triple encoding

                                                       Triple encoding




                                                         3 DES keys




      Ver. 1.0                        Session 9                                    Slide 12 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Activity 11-6




                            Examining Default
                              IPSec Policies




      Ver. 1.0                 Session 9                      Slide 13 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Digital Certificates


                 •   A digital certificate is an electronic document that
                     associates credentials with a public key.
                 •   A server called a Certificate Authority (CA) issues
                     certificates and the associated public/private key pairs.
                 •   Both users and devices can hold certificates.




                                                              CA
                                                 Issues             Trusts CA and
                                                certificate            accepts
                                                                      certificate




                                                              Presents
                                                              certificate

                                  Certificate holder                            Resource



      Ver. 1.0                                Session 9                                    Slide 14 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Activity 11-7




                       Installing a Root Certificate
                               Authority (CA)




      Ver. 1.0                 Session 9                      Slide 15 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Public Key Infrastructure (PKI)


                 •   PKI is a hierarchical authentication and validation system
                     that is composed of CAs, certificates, software, services,
                     and other cryptographic components.
                 •   PKI issues and maintains public/private key pairs and
                     certificates.
                                     Server
                                    certificate

                                                                          Certificates
                                                                          and key pair


                                                                 User01




                          Root CA                   Issuing CA
                                                                          Certificates
                                                                          and key pair

                                                                 User02




      Ver. 1.0                                    Session 9                         Slide 16 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 The Certificate Encryption Process


                 •   Certificate Encryption Process :



                                CA



                                 1                      3




                                            2

                                            4

                              User01               User02




                 •   The Encrypting File System (EFS) is a file-encryption tool
                     available on Windows systems that have partitions
                     formatted with NTFS.

      Ver. 1.0                         Session 9                        Slide 17 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 The Certificate Authentication Process


                 •   The Certificate Authentication Process:

                                                                            User01 public
                                                                              key decrypts




                                              Private key
                                           encrypts signature




                           User01                               User02



                 •   Digital signature is a small piece of encrypted data that is
                     attached to a message to verify the sender’s identify.



      Ver. 1.0                           Session 9                                  Slide 18 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 IP Security (IPSec)


                 •   IPSec is a versatile, nonproprietary suite of security
                     standards that provides end-to-end authentication and
                     encryption for secure communications sessions on IP
                     networks.               Negotiate Security
                                              Association (SA)




                                             Negotiate encryption




                                            Communicate securely




      Ver. 1.0                        Session 9                          Slide 19 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 IPSec Levels


                 There are three IPSec levels:
                     Client
                     Server
                     Secure Server

                                                       Require security
                            Secure Server




                                                       Request security
                                 Server




                                                        Respond only
                                  Client




      Ver. 1.0                             Session 9                      Slide 20 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 IPSec Policies


                       IPSec policies are composed of rules, and each rule has
                       five component, as shown in the following figure:



                                                                             Components of
        Rules in the                                                            a rule
          policy




      Ver. 1.0                          Session 9                         Slide 21 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 The SSL Process


                 Secure Sockets Layer (SSL) is a security protocol that
                 combines digital certificates for authentication with RSA
                 public-key data encryption.
                 The SSL is a server driven process which works, as shown
                 in the following figure:
                                   Request secure https: connection




                                    Send certificate and public key




                                         Negotiate encryption




      Ver. 1.0                    Session 9                           Slide 22 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Network Address Translation (NAT)


                 •   Network address translation (NAT) is a form of Internet
                     security that conceals internal addressing schemes from the
                     public Internet.

                                                        NAT Server


                                                                     24.96.83.120


                        192.168.12.20   192.168.12.30

                                                        192.168.12.100




                     NAT is implemented as:
                         Software such as ICS in Windows systems.
                         Hardware such as cable modems and DSL routers.

      Ver. 1.0                             Session 9                                Slide 23 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Activity 11-8




                        Examining Proxy Settings




      Ver. 1.0                 Session 9                      Slide 24 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 The NAT Process


                 The NAT process translates external and internal addresses
                 based on port numbers following the steps:
                      • Step-1: Client request
                      • Step-2: Source address conversion
                      • Step-3: Data return
                      • Step-4: Internal source identification
                      • Step-5: Data deliver

                             192.168.12.40:80            24.96.83.120:23,040




                    Client                      NAT server                     Web server




                                     Port#         Internal address
                                     23,040        192.168.12.40:80

                                       Address translation table


      Ver. 1.0                                    Session 9                                 Slide 25 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Firewalls


                 •   A firewall is a software program or hardware device that
                     protects networks from unauthorized data by blocking
                     unsolicited traffic.

                                                  Approved traffic




                                                     Firewall


                                                                Unapproved traffic




      Ver. 1.0                        Session 9                                      Slide 26 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Demilitarized Zones (DMZs)


                 •   DMZ is a small section of a private network that is located
                     between two firewalls and made available for public access.

                                                       DMZ




                                                  Web server




      Ver. 1.0                        Session 9                         Slide 27 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Internet Proxies


                 •   An Internet proxy is a system that isolates internal
                     networks from the Internet by downloading and storing
                     Internet files on behalf of internal clients.




      Ver. 1.0                        Session 9                         Slide 28 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Website Caching


                 The caching process enables Web proxies to cache web
                 data for clients by following the steps:


                 1           Client requests site                                    Proxy forwards request




                         Proxy returns site to client                               Website responds to proxy




                                      2                         New request




                                                        Proxy responds from cache




      Ver. 1.0                                Session 9                                                         Slide 29 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Web Proxy Features


                 Web proxies can incorporate a number of enhanced
                 features, such as:
                    User security
                    Gateway services
                    Auditing
                    Remote access services
                    Content filtering




      Ver. 1.0                   Session 9                          Slide 30 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Remote Network Architectures


                 The various components of a remote network
                 implementation :
                    Remote Networking
                    Remote Access Networking
                    Remote Access Services (RAS) Servers
                    Remote Control Networking
                    Terminal Services




      Ver. 1.0                   Session 9                    Slide 31 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Remote Networking


                 •    Remote networking is a type of network communication
                      that enables users to access resources that are not at their
                      physical locations.
                                            PSTN




                            Modem                              Modem
                  Remote                                                 Remote
                 computer                                              access server




                                Established connectcion mechanism                      Network resources




                 •    The biggest limitation to remote networks is the connection
                      bandwidth.

      Ver. 1.0                                  Session 9                                       Slide 32 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Activity 12-1




                      Configuring Windows RRAS
                          as a Dial-Up Server




      Ver. 1.0                 Session 9                      Slide 33 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Remote Access Networking


                 In remote access networking, a remote node uses a remote
                 connection to attach to a network.
                 Most remote access connections are made to:
                    Dial-in server
                    Remote access server:
                     • Provides security
                     • Provides log users




      Ver. 1.0                      Session 9                     Slide 34 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Activity 12-2




                       Enabling and Creating
                     Remote Desktop Connections




      Ver. 1.0                 Session 9                      Slide 35 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Remote Control Networking


                  Remote control uses a special software package that
                  enables a remote client to take over a host computer on the
                  network.
                                                  Host client should be a
                                                   dedicated machine




                 Remote                               Host client
                  Client




      Ver. 1.0                     Session 9                                Slide 36 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Terminal Services Implementations


                 •   Terminal services enable companies to deploy
                     applications thus providing flexible functionality to remote
                     users.
                 •   The common terminal services components and network
                     implementations are:
                         Thin Clients
                         Thin Client Components
                         Microsoft Terminal Services
                         Windows Terminal Services Features
                         Citrix MetaFrame
                         Web-Based Remote Access




      Ver. 1.0                         Session 9                            Slide 37 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Thin Clients


                 •   A thin client is any machine that uses a thin client protocol
                     to connect to a server in order to access and run
                     applications.
                 •   Thin client is configured as to various operating systems,
                     such as:
                         UNIX                    PC running thin client
                                                   software has more
                                                                                        Session 2
                         Windows                       hardware
                                                  and an OS installed

                           Dedicated thin client has
                           minimal hardware and no
                                 OS installed
                                                                                                     Emulates a
                                                                          Application                complete
                                      Client 1           Client 2           server      Session 1    computing
                                                                                                    environment




      Ver. 1.0                                    Session 9                                            Slide 38 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Activity 12-4




                           Installing Microsoft
                             Terminal Server




      Ver. 1.0                 Session 9                      Slide 39 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Thin Client Components


                     The thin client consists of four basic parts, as shown in the
                     following figure:


                                                      Connects to server

                 Input device
                 Output device                          Downloads OS
                 Network connection
                 Client software
                                                      Launches a session
                                      Thin client
                                                                           Application
                                                                             server




      Ver. 1.0                            Session 9                              Slide 40 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Microsoft Terminal Services


                   Terminal services provides client access to all Windows-
                   compatible applications by opening a user session on the
                   server.
                                              Windows 2000
                                         Professional and Remote
                                               Desktop for                    Session 2
                                              Administration

                 Windows XP Professional and                                               Provides Client 2 access
                 Remote Desktop Connection                                                to administrative tools and
                                                                                                 functionality

                                                                   Terminal
                           Client 1              Client 2                     Session 1
                                                                    Server



                                                                                          Provides Client 1 access
                                                                                           to a shared application




      Ver. 1.0                                       Session 9                                     Slide 41 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Citrix MetaFrame


                 •    Citrix MetaFrame is a terminal services application that
                      provides client connectivity for Windows, Linux, Macintosh,
                      and UNIX desktops.


                                          Server with      Server with
                                        32 connections   32 connections



                 Server farm supports                                     Can add servers without
                   64 connections                                          changing existing farm




      Ver. 1.0                              Session 9                           Slide 42 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Web-Based Remote Access


                 Web-based remote access means providing access to
                 services and data through web browsers.
                  Remote user accesses applications
                         via a web browser                     Terminal Server enables
                                                                remote administration




                   Remote administrator manages
                 application servers via a web browser           Web server hosts
                                                                   applications




      Ver. 1.0                                     Session 9                             Slide 43 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Summary


                 In this session, you learned that:
                  •   Network authentication methods such as Strong Passwords,
                      Kerberos, and Extensible Authentication Protocol (EAP) are the
                      first line of defense against attack or intrusion into network
                      systems.
                  •   The major data encryption methods and technologies are:
                         Key-Based Encryption Systems
                         Data Encryption Standard (DES)
                         Digital Certificates
                         Public Key Infrastructure (PKI)
                         The Certificate Encryption Process
                         The Certificate Authentication Process
                         IP Security (IPSec)
                         IPSec Policies
                         Secure Sockets Layer (SSL)
                         The SSL Process

      Ver. 1.0                        Session 9                            Slide 44 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Summary



                  The primary techniques used to secure Internet connections
                  are:
                     Network Address Translation (NAT)
                     The NAT Process
                     Firewalls
                     Demilitarized Zones (DMZs)
                     Internet Proxies
                     Website Caching
                     Web Proxy Features




      Ver. 1.0                   Session 9                           Slide 45 of 38
CompTIA N+ Certification: Network Security and Remote Networking
 Installing Windows XP Professional Using Attended Installation

 Summary (Contd.)


                  The major architectures in remote networking
                  implementations:
                   •   Remote Networking
                   •   Remote Access Networking
                   •   Remote Access Services (RAS) Servers
                   •   Remote Control Networking
                   • Terminal Services
                  The common terminal services network implementations:
                       Thin Clients
                       Thin Client Components
                       Microsoft Terminal Services
                       Windows Terminal Services Features
                       Citrix MetaFrame
                       Web-Based Remote Access



      Ver. 1.0                     Session 9                       Slide 46 of 38

Weitere ähnliche Inhalte

Was ist angesagt?

Comp tia n+_session_01
Comp tia n+_session_01Comp tia n+_session_01
Comp tia n+_session_01Niit Care
 
Comp tia a+_session_11
Comp tia a+_session_11Comp tia a+_session_11
Comp tia a+_session_11Niit Care
 
Comp tia a+_session_03
Comp tia a+_session_03Comp tia a+_session_03
Comp tia a+_session_03Niit Care
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02Niit Care
 
Comp tia n+_session_08
Comp tia n+_session_08Comp tia n+_session_08
Comp tia n+_session_08Niit Care
 
Comp tia n+_intro_session
Comp tia n+_intro_sessionComp tia n+_intro_session
Comp tia n+_intro_sessionNiit Care
 
Comp tia a+_session_02
Comp tia a+_session_02Comp tia a+_session_02
Comp tia a+_session_02Niit Care
 
Comp tia n+_session_03
Comp tia n+_session_03Comp tia n+_session_03
Comp tia n+_session_03Niit Care
 
Comp tia a+_session_05
Comp tia a+_session_05Comp tia a+_session_05
Comp tia a+_session_05Niit Care
 
Maemo Platform Security Fosdem
Maemo Platform Security FosdemMaemo Platform Security Fosdem
Maemo Platform Security FosdemElena Reshetova
 
Skype testing overview
Skype testing overviewSkype testing overview
Skype testing overviewQA Club Kiev
 
Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Houcheng Lee
 
13.30 hr Hebinck
13.30 hr Hebinck13.30 hr Hebinck
13.30 hr HebinckThemadagen
 
Singularity Rethinking The Software Stack
Singularity    Rethinking The  Software  StackSingularity    Rethinking The  Software  Stack
Singularity Rethinking The Software Stackalanocu
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010Vadimazz
 

Was ist angesagt? (19)

Comp tia n+_session_01
Comp tia n+_session_01Comp tia n+_session_01
Comp tia n+_session_01
 
Comp tia a+_session_11
Comp tia a+_session_11Comp tia a+_session_11
Comp tia a+_session_11
 
Comp tia a+_session_03
Comp tia a+_session_03Comp tia a+_session_03
Comp tia a+_session_03
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02
 
Comp tia n+_session_08
Comp tia n+_session_08Comp tia n+_session_08
Comp tia n+_session_08
 
Comp tia n+_intro_session
Comp tia n+_intro_sessionComp tia n+_intro_session
Comp tia n+_intro_session
 
Comp tia a+_session_02
Comp tia a+_session_02Comp tia a+_session_02
Comp tia a+_session_02
 
Comp tia n+_session_03
Comp tia n+_session_03Comp tia n+_session_03
Comp tia n+_session_03
 
Comp tia a+_session_05
Comp tia a+_session_05Comp tia a+_session_05
Comp tia a+_session_05
 
Maemo Platform Security Fosdem
Maemo Platform Security FosdemMaemo Platform Security Fosdem
Maemo Platform Security Fosdem
 
Skype testing overview
Skype testing overviewSkype testing overview
Skype testing overview
 
Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)
 
13.30 hr Hebinck
13.30 hr Hebinck13.30 hr Hebinck
13.30 hr Hebinck
 
Singularity Rethinking The Software Stack
Singularity    Rethinking The  Software  StackSingularity    Rethinking The  Software  Stack
Singularity Rethinking The Software Stack
 
SERVICE AGGREMENT IT
SERVICE AGGREMENT ITSERVICE AGGREMENT IT
SERVICE AGGREMENT IT
 
Cisco ios versions
Cisco ios versionsCisco ios versions
Cisco ios versions
 
Moderne device management door middel van cloud
Moderne device management door middel van cloudModerne device management door middel van cloud
Moderne device management door middel van cloud
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010
 

Andere mochten auch

Comp tia a+_session_13
Comp tia a+_session_13Comp tia a+_session_13
Comp tia a+_session_13Niit Care
 
Comp tia a+_session_10
Comp tia a+_session_10Comp tia a+_session_10
Comp tia a+_session_10Niit Care
 
Comp tia a+_session_09
Comp tia a+_session_09Comp tia a+_session_09
Comp tia a+_session_09Niit Care
 
Networking Chapter 11
Networking Chapter 11Networking Chapter 11
Networking Chapter 11mlrbrown
 
CompTIA Network+ Lesson
CompTIA Network+ LessonCompTIA Network+ Lesson
CompTIA Network+ LessonPhoenix TS
 
Aξιολόγηση του εκπαιδευτικού έργου
Aξιολόγηση του εκπαιδευτικού έργουAξιολόγηση του εκπαιδευτικού έργου
Aξιολόγηση του εκπαιδευτικού έργουSakis Karakousis
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction Dsunte Wilson
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationDouglas Gourlay
 
Comp tia a+_session_14
Comp tia a+_session_14Comp tia a+_session_14
Comp tia a+_session_14Niit Care
 
CompTIA Network+ Objectives
CompTIA Network+ ObjectivesCompTIA Network+ Objectives
CompTIA Network+ Objectivessombat nirund
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 

Andere mochten auch (20)

Comp tia a+_session_13
Comp tia a+_session_13Comp tia a+_session_13
Comp tia a+_session_13
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
 
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)
 
CompTIA A+ (2009 edition) certificate
CompTIA A+ (2009 edition) certificateCompTIA A+ (2009 edition) certificate
CompTIA A+ (2009 edition) certificate
 
Comp tia a+_session_10
Comp tia a+_session_10Comp tia a+_session_10
Comp tia a+_session_10
 
Comp tia a+_session_09
Comp tia a+_session_09Comp tia a+_session_09
Comp tia a+_session_09
 
PACE-IT: Introduction to IPv4 (part 1) - N10 006
PACE-IT: Introduction to IPv4 (part 1) - N10 006 PACE-IT: Introduction to IPv4 (part 1) - N10 006
PACE-IT: Introduction to IPv4 (part 1) - N10 006
 
Networking Chapter 11
Networking Chapter 11Networking Chapter 11
Networking Chapter 11
 
CompTIA Network+ Lesson
CompTIA Network+ LessonCompTIA Network+ Lesson
CompTIA Network+ Lesson
 
Aξιολόγηση του εκπαιδευτικού έργου
Aξιολόγηση του εκπαιδευτικού έργουAξιολόγηση του εκπαιδευτικού έργου
Aξιολόγηση του εκπαιδευτικού έργου
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
CompTIA network plus
CompTIA   network plusCompTIA   network plus
CompTIA network plus
 
Internet
InternetInternet
Internet
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems Presentation
 
Comp tia a+_session_14
Comp tia a+_session_14Comp tia a+_session_14
Comp tia a+_session_14
 
CompTIA Network+ Objectives
CompTIA Network+ ObjectivesCompTIA Network+ Objectives
CompTIA Network+ Objectives
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 

Ähnlich wie Comp tia n+_session_09

Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLSOlle E Johansson
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentRamesh Nagappan
 
Kerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsKerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsIRJET Journal
 
[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp Security[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp SecurityCarles Farré
 
IEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ ImplementationIEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ ImplementationAxis Communications
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesSherry Bailey
 
MTLS in a Microservices World
MTLS in a Microservices WorldMTLS in a Microservices World
MTLS in a Microservices WorldDiogo Mónica
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...DATA SECURITY SOLUTIONS
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications guest879f38
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...ZTech Proje
 
kerb.ppt
kerb.pptkerb.ppt
kerb.pptJdQi
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 

Ähnlich wie Comp tia n+_session_09 (20)

Implementing Application Security
Implementing Application SecurityImplementing Application Security
Implementing Application Security
 
Iuwne10 S04 L04
Iuwne10 S04 L04Iuwne10 S04 L04
Iuwne10 S04 L04
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 
Kerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsKerberos Security in Distributed Systems
Kerberos Security in Distributed Systems
 
[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp Security[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp Security
 
IEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ ImplementationIEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ Implementation
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay Examples
 
MTLS in a Microservices World
MTLS in a Microservices WorldMTLS in a Microservices World
MTLS in a Microservices World
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
 
kerb.ppt
kerb.pptkerb.ppt
kerb.ppt
 
status
statusstatus
status
 
status
statusstatus
status
 
ffv
ffvffv
ffv
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 

Mehr von Niit Care (20)

Ajs 1 b
Ajs 1 bAjs 1 b
Ajs 1 b
 
Ajs 4 b
Ajs 4 bAjs 4 b
Ajs 4 b
 
Ajs 4 a
Ajs 4 aAjs 4 a
Ajs 4 a
 
Ajs 4 c
Ajs 4 cAjs 4 c
Ajs 4 c
 
Ajs 3 b
Ajs 3 bAjs 3 b
Ajs 3 b
 
Ajs 3 a
Ajs 3 aAjs 3 a
Ajs 3 a
 
Ajs 3 c
Ajs 3 cAjs 3 c
Ajs 3 c
 
Ajs 2 b
Ajs 2 bAjs 2 b
Ajs 2 b
 
Ajs 2 a
Ajs 2 aAjs 2 a
Ajs 2 a
 
Ajs 2 c
Ajs 2 cAjs 2 c
Ajs 2 c
 
Ajs 1 a
Ajs 1 aAjs 1 a
Ajs 1 a
 
Ajs 1 c
Ajs 1 cAjs 1 c
Ajs 1 c
 
Dacj 4 2-c
Dacj 4 2-cDacj 4 2-c
Dacj 4 2-c
 
Dacj 4 2-b
Dacj 4 2-bDacj 4 2-b
Dacj 4 2-b
 
Dacj 4 2-a
Dacj 4 2-aDacj 4 2-a
Dacj 4 2-a
 
Dacj 4 1-c
Dacj 4 1-cDacj 4 1-c
Dacj 4 1-c
 
Dacj 4 1-b
Dacj 4 1-bDacj 4 1-b
Dacj 4 1-b
 
Dacj 4 1-a
Dacj 4 1-aDacj 4 1-a
Dacj 4 1-a
 
Dacj 1-2 b
Dacj 1-2 bDacj 1-2 b
Dacj 1-2 b
 
Dacj 1-3 c
Dacj 1-3 cDacj 1-3 c
Dacj 1-3 c
 

Kürzlich hochgeladen

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Kürzlich hochgeladen (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Comp tia n+_session_09

  • 1. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Objectives In this session, you will learn to: Identify network authentication methods. Identify major data encryption methods and technologies. Identify the primary techniques used to secure Internet connections. Identify the major architectures in remote networking implementations. Identify common terminal services network implementations. Ver. 1.0 Session 9 Slide 1 of 38
  • 2. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Network Authentication Methods In a network environment, the security settings control how users and computers authenticate to the network. Authentication is the first line of defense against attack or intrusion into network systems. The various network authentication methods are: Strong Passwords Kerberos Extensible Authentication Protocol (EAP) Ver. 1.0 Session 9 Slide 2 of 38
  • 3. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Strong Passwords • A strong password is a password that meets complexity requirements that are set by a system administrator and documented in a password policy by specifying: Minimum length Special characters !Pass1234 Uppercase letters Numbers Lowercase letters • Authentication based entirely on a user name/password combination is sometimes called authentication by assertion. Ver. 1.0 Session 9 Slide 3 of 38
  • 4. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Kerberos • Kerberos is an Internet standard authentication protocol that links a user name and password to an authority that can certify that the user is valid and also verify the user’s ability to access resources. KAS Authenticates Trusts KAS with KAS Uses credentials to access resources Resource User01 server Ver. 1.0 Session 9 Slide 4 of 38
  • 5. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation The Kerberos Process A Kerberos client uses a Kerberos authentication process to establish a secure connection with a service. 1 Credentials 2 KAS User01 TGT 5 3 TGT 4 Session Session Resource server Ver. 1.0 Session 9 Slide 5 of 38
  • 6. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Extensible Authentication Protocol (EAP) • Extensible Authentication Protocol (EAP) is an authentication protocol that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication. EAP enables hardware-based authentication Fingerprint scanner Smart card reader Ver. 1.0 Session 9 Slide 6 of 38
  • 7. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Activity 11-4 Activity Examining Strong Passwords Ver. 1.0 Session 9 Slide 7 of 38
  • 8. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Data Encryption • Data encryption is a way to secure client information. • The various data encryption methods and technologies are: Key-Based Encryption Systems Data Encryption Standard (DES) Digital Certificates Public Key Infrastructure (PKI) The Certificate Encryption Process The Certificate Authentication Process IP Security (IPSec) IPSec Levels IPSec Policies Secure Sockets Layer (SSL) The SSL Process Ver. 1.0 Session 9 Slide 8 of 38
  • 9. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Key-Based Encryption Systems • Key-based encryption system uses a key to control how information is encoded and decoded. • Types of key-based encryption: Shared-key or symmetric system Key-pair or asymmetric system with two keys: • A public key • A private key The following figure depicts the shared-key encryption system: Encrypts data Decrypts data Same key on both sides Ver. 1.0 Session 9 Slide 9 of 38
  • 10. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Key-Based Encryption Systems (Contd.) The following figure depicts the private-key encryption system: 1 Exchange public keys Public key A Computer A Computer B Public key B 2 Data encrypted using public key B 3 Data decrypted with private key B Computer A Computer B Computer A Computer B Ver. 1.0 Session 9 Slide 10 of 38
  • 11. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Activity 11-5 Encrypting Data with EFS Ver. 1.0 Session 9 Slide 11 of 38
  • 12. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Data Encryption Standard (DES) • DES is a shared-key encryption standard that is based on a 56-bit encryption key that includes an additional 8 parity bits. 56 bits 8 parity bits Shared DES key Triple encoding Triple encoding 3 DES keys Ver. 1.0 Session 9 Slide 12 of 38
  • 13. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Activity 11-6 Examining Default IPSec Policies Ver. 1.0 Session 9 Slide 13 of 38
  • 14. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Digital Certificates • A digital certificate is an electronic document that associates credentials with a public key. • A server called a Certificate Authority (CA) issues certificates and the associated public/private key pairs. • Both users and devices can hold certificates. CA Issues Trusts CA and certificate accepts certificate Presents certificate Certificate holder Resource Ver. 1.0 Session 9 Slide 14 of 38
  • 15. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Activity 11-7 Installing a Root Certificate Authority (CA) Ver. 1.0 Session 9 Slide 15 of 38
  • 16. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Public Key Infrastructure (PKI) • PKI is a hierarchical authentication and validation system that is composed of CAs, certificates, software, services, and other cryptographic components. • PKI issues and maintains public/private key pairs and certificates. Server certificate Certificates and key pair User01 Root CA Issuing CA Certificates and key pair User02 Ver. 1.0 Session 9 Slide 16 of 38
  • 17. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation The Certificate Encryption Process • Certificate Encryption Process : CA 1 3 2 4 User01 User02 • The Encrypting File System (EFS) is a file-encryption tool available on Windows systems that have partitions formatted with NTFS. Ver. 1.0 Session 9 Slide 17 of 38
  • 18. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation The Certificate Authentication Process • The Certificate Authentication Process: User01 public key decrypts Private key encrypts signature User01 User02 • Digital signature is a small piece of encrypted data that is attached to a message to verify the sender’s identify. Ver. 1.0 Session 9 Slide 18 of 38
  • 19. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation IP Security (IPSec) • IPSec is a versatile, nonproprietary suite of security standards that provides end-to-end authentication and encryption for secure communications sessions on IP networks. Negotiate Security Association (SA) Negotiate encryption Communicate securely Ver. 1.0 Session 9 Slide 19 of 38
  • 20. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation IPSec Levels There are three IPSec levels: Client Server Secure Server Require security Secure Server Request security Server Respond only Client Ver. 1.0 Session 9 Slide 20 of 38
  • 21. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation IPSec Policies IPSec policies are composed of rules, and each rule has five component, as shown in the following figure: Components of Rules in the a rule policy Ver. 1.0 Session 9 Slide 21 of 38
  • 22. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation The SSL Process Secure Sockets Layer (SSL) is a security protocol that combines digital certificates for authentication with RSA public-key data encryption. The SSL is a server driven process which works, as shown in the following figure: Request secure https: connection Send certificate and public key Negotiate encryption Ver. 1.0 Session 9 Slide 22 of 38
  • 23. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Network Address Translation (NAT) • Network address translation (NAT) is a form of Internet security that conceals internal addressing schemes from the public Internet. NAT Server 24.96.83.120 192.168.12.20 192.168.12.30 192.168.12.100 NAT is implemented as: Software such as ICS in Windows systems. Hardware such as cable modems and DSL routers. Ver. 1.0 Session 9 Slide 23 of 38
  • 24. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Activity 11-8 Examining Proxy Settings Ver. 1.0 Session 9 Slide 24 of 38
  • 25. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation The NAT Process The NAT process translates external and internal addresses based on port numbers following the steps: • Step-1: Client request • Step-2: Source address conversion • Step-3: Data return • Step-4: Internal source identification • Step-5: Data deliver 192.168.12.40:80 24.96.83.120:23,040 Client NAT server Web server Port# Internal address 23,040 192.168.12.40:80 Address translation table Ver. 1.0 Session 9 Slide 25 of 38
  • 26. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Firewalls • A firewall is a software program or hardware device that protects networks from unauthorized data by blocking unsolicited traffic. Approved traffic Firewall Unapproved traffic Ver. 1.0 Session 9 Slide 26 of 38
  • 27. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Demilitarized Zones (DMZs) • DMZ is a small section of a private network that is located between two firewalls and made available for public access. DMZ Web server Ver. 1.0 Session 9 Slide 27 of 38
  • 28. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Internet Proxies • An Internet proxy is a system that isolates internal networks from the Internet by downloading and storing Internet files on behalf of internal clients. Ver. 1.0 Session 9 Slide 28 of 38
  • 29. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Website Caching The caching process enables Web proxies to cache web data for clients by following the steps: 1 Client requests site Proxy forwards request Proxy returns site to client Website responds to proxy 2 New request Proxy responds from cache Ver. 1.0 Session 9 Slide 29 of 38
  • 30. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Web Proxy Features Web proxies can incorporate a number of enhanced features, such as: User security Gateway services Auditing Remote access services Content filtering Ver. 1.0 Session 9 Slide 30 of 38
  • 31. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Remote Network Architectures The various components of a remote network implementation : Remote Networking Remote Access Networking Remote Access Services (RAS) Servers Remote Control Networking Terminal Services Ver. 1.0 Session 9 Slide 31 of 38
  • 32. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Remote Networking • Remote networking is a type of network communication that enables users to access resources that are not at their physical locations. PSTN Modem Modem Remote Remote computer access server Established connectcion mechanism Network resources • The biggest limitation to remote networks is the connection bandwidth. Ver. 1.0 Session 9 Slide 32 of 38
  • 33. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Activity 12-1 Configuring Windows RRAS as a Dial-Up Server Ver. 1.0 Session 9 Slide 33 of 38
  • 34. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Remote Access Networking In remote access networking, a remote node uses a remote connection to attach to a network. Most remote access connections are made to: Dial-in server Remote access server: • Provides security • Provides log users Ver. 1.0 Session 9 Slide 34 of 38
  • 35. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Activity 12-2 Enabling and Creating Remote Desktop Connections Ver. 1.0 Session 9 Slide 35 of 38
  • 36. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Remote Control Networking Remote control uses a special software package that enables a remote client to take over a host computer on the network. Host client should be a dedicated machine Remote Host client Client Ver. 1.0 Session 9 Slide 36 of 38
  • 37. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Terminal Services Implementations • Terminal services enable companies to deploy applications thus providing flexible functionality to remote users. • The common terminal services components and network implementations are: Thin Clients Thin Client Components Microsoft Terminal Services Windows Terminal Services Features Citrix MetaFrame Web-Based Remote Access Ver. 1.0 Session 9 Slide 37 of 38
  • 38. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Thin Clients • A thin client is any machine that uses a thin client protocol to connect to a server in order to access and run applications. • Thin client is configured as to various operating systems, such as: UNIX PC running thin client software has more Session 2 Windows hardware and an OS installed Dedicated thin client has minimal hardware and no OS installed Emulates a Application complete Client 1 Client 2 server Session 1 computing environment Ver. 1.0 Session 9 Slide 38 of 38
  • 39. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Activity 12-4 Installing Microsoft Terminal Server Ver. 1.0 Session 9 Slide 39 of 38
  • 40. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Thin Client Components The thin client consists of four basic parts, as shown in the following figure: Connects to server Input device Output device Downloads OS Network connection Client software Launches a session Thin client Application server Ver. 1.0 Session 9 Slide 40 of 38
  • 41. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Microsoft Terminal Services Terminal services provides client access to all Windows- compatible applications by opening a user session on the server. Windows 2000 Professional and Remote Desktop for Session 2 Administration Windows XP Professional and Provides Client 2 access Remote Desktop Connection to administrative tools and functionality Terminal Client 1 Client 2 Session 1 Server Provides Client 1 access to a shared application Ver. 1.0 Session 9 Slide 41 of 38
  • 42. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Citrix MetaFrame • Citrix MetaFrame is a terminal services application that provides client connectivity for Windows, Linux, Macintosh, and UNIX desktops. Server with Server with 32 connections 32 connections Server farm supports Can add servers without 64 connections changing existing farm Ver. 1.0 Session 9 Slide 42 of 38
  • 43. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Web-Based Remote Access Web-based remote access means providing access to services and data through web browsers. Remote user accesses applications via a web browser Terminal Server enables remote administration Remote administrator manages application servers via a web browser Web server hosts applications Ver. 1.0 Session 9 Slide 43 of 38
  • 44. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Summary In this session, you learned that: • Network authentication methods such as Strong Passwords, Kerberos, and Extensible Authentication Protocol (EAP) are the first line of defense against attack or intrusion into network systems. • The major data encryption methods and technologies are: Key-Based Encryption Systems Data Encryption Standard (DES) Digital Certificates Public Key Infrastructure (PKI) The Certificate Encryption Process The Certificate Authentication Process IP Security (IPSec) IPSec Policies Secure Sockets Layer (SSL) The SSL Process Ver. 1.0 Session 9 Slide 44 of 38
  • 45. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Summary The primary techniques used to secure Internet connections are: Network Address Translation (NAT) The NAT Process Firewalls Demilitarized Zones (DMZs) Internet Proxies Website Caching Web Proxy Features Ver. 1.0 Session 9 Slide 45 of 38
  • 46. CompTIA N+ Certification: Network Security and Remote Networking Installing Windows XP Professional Using Attended Installation Summary (Contd.) The major architectures in remote networking implementations: • Remote Networking • Remote Access Networking • Remote Access Services (RAS) Servers • Remote Control Networking • Terminal Services The common terminal services network implementations: Thin Clients Thin Client Components Microsoft Terminal Services Windows Terminal Services Features Citrix MetaFrame Web-Based Remote Access Ver. 1.0 Session 9 Slide 46 of 38

Hinweis der Redaktion

  1. You need to tell the password complexity requirements as given in page no. 377 of CG.
  2. A proxy server combines NAT, firewall, and caching functionality.
  3. You have to tell about: Remote control solutions Network access through remote control As given in the page no 416 of CG.
  4. You need to tell about the advantages of thin clients as given in page no 425 of CG.
  5. You need to tell about the advantages of thin clients as given in page no 425 of CG.
  6. You need to tell about the advantages of thin clients as given in page no 425 of CG.
  7. You need to tell about the advantages of thin clients as given in page no 425 of CG.
  8. To be modified
  9. To be modified
  10. To be modified