SlideShare ist ein Scribd-Unternehmen logo
1 von 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Objectives


                  In this session, you will learn to:
                     Identify methods for securing wireless communications.
                     Identify appropriate responses to social engineering attacks.
                     Install and configure security measures.
                     Maintain and troubleshoot security measures.




       Ver. 1.0                      Session 15                              Slide 1 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Wireless Security


                  Increase in the number of wireless computing devices has
                  given rise to the need for protecting wireless network
                  communications.




       Ver. 1.0                   Session 15                         Slide 2 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Wireless Encryption Methods


                  The protocols that are available to encrypt and secure
                  wireless communications are:
                      WEP
                      WTLS
                      802.1x
                      WPA
                      802.11i




       Ver. 1.0                    Session 15                          Slide 3 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Security Methods for Wireless Access Points


                  The methods that increase the security on wireless access
                  points are:
                     User authentication
                     Data encryption
                     Anitvirus software
                     Security patches
                     MAC filters
                     Static IP
                     Use firewall
                     Change default username
                     Alter or disable SSID
                     Configure vendor’s security settings




       Ver. 1.0                     Session 15                       Slide 4 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Wireless Client Configuration Options


                  The options for increasing the security on wireless clients
                  are:
                   •   Data encryption
                   •   Antivirus software
                   •   Security patches
                   •   Secure the wireless access point.




       Ver. 1.0                       Session 15                        Slide 5 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Social Engineering


                  •   Social engineering is a technique used to obtain
                      confidential information by manipulating the computer
                      system users.




       Ver. 1.0                        Session 15                         Slide 6 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Social Engineering Attacks


                  •   A social engineering attack is a type of attack that uses
                      the steps to gather information from users:
                      1.   Attacker obtains credentials from user
                      2.   Attacker uses credentials to mount attack




                                         1

                                               User name
                                               Password


                                         2

                             Attacker




                                                           Target




       Ver. 1.0                         Session 15                       Slide 7 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Social Engineering Prevention


                  The most effective way to prevent damage from social
                  engineering attacks is to train individuals to recognize and
                  respond to these attacks properly.
                  Types of biometrics are:
                      Fingerprint scan
                      Retinal scan
                      Voice recognition
                      Face recognition
                      Biometric authentication token




       Ver. 1.0                     Session 15                          Slide 8 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Install and Configure Security Measures


                  To implement the appropriate security measures you must
                  first install and configure security measures.
                  As a computer support technician you will need to have the
                  security knowledge and skills to install the proper measures
                  so that systems are protected and users can access the
                  resources they need.




       Ver. 1.0                    Session 15                          Slide 9 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Windows Security Policies


                  •   Windows security policies are Windows configuration
                      settings that control the overall security behavior of the
                      system.     Policies set centrally
                                           for computer




                                                                            Configuratio
                                                                             n settings




                       Security Settings
                        node in policy
                            object




       Ver. 1.0                                   Session 15                 Slide 10 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Windows Firewall


                  •   Windows Firewall is a software-based firewall available
                      with Service Pack 2 for Windows XP.




       Ver. 1.0                        Session 15                        Slide 11 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Software Firewall Configuration Settings


                  •   Most software-based firewalls offer configuration settings for
                      common security options, such as:
                          Global security level
                          Application access
                          Security log
                          Unsolicited traffic blocking




       Ver. 1.0                           Session 15                        Slide 12 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Computer Security Measures


                  When you select and apply computer security measures,
                  you must:
                     Protect system
                     Protect applications and data
                     Permit legitimate access




       Ver. 1.0                    Session 15                      Slide 13 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Activity 15-1




                        Activity on Configuring
                        Windows Firewall




       Ver. 1.0                Session 15                       Slide 14 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Activity 15-2




                        Activity on Configuring
                        NTFS Permissions




       Ver. 1.0                Session 15                       Slide 15 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Activity 15-3




                        Activity on Using File
                        Encryption




       Ver. 1.0                Session 15                       Slide 16 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Maintaining and Troubleshooting Security Measures


                  •   System security is a ongoing process, so once the security
                      measures are installed they must be maintained to:
                          To avoid attacks.
                          Troubleshoot in response to user access problems.
                          Address directly or escalate.




       Ver. 1.0                          Session 15                                Slide 17 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Common Computer Security Issues


                  The common computer security issues are:
                     BIOS security
                     Biometric security
                     Authentication
                     Malicious software
                     File system security
                     Data access issues
                     Backup security




       Ver. 1.0                     Session 15                  Slide 18 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Common Software Firewall Issues


                  •   The common software firewall issues are:
                         Disabling
                         Open ports
                         LAN and VPN traffic
                         Firewall conflicts
                         Program dependencies
                         Outgoing traffic
                         User errors




       Ver. 1.0                       Session 15                 Slide 19 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Common Wireless Client Configuration Issues


                  The common wireless client configuration issues are:
                     Protocol compatibility
                     WEP
                     SSL on WAP
                     Buffer overflow
                     Viruses
                     Data in plain text
                     Lack of authentication
                     Site surveys
                     Unused connections




       Ver. 1.0                     Session 15                       Slide 20 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Common Encryption Issues


                  •   The common encryption issues are:
                         Effectiveness of encryption:
                          • Computational power
                          • Size of encryption key
                          • New attacks and exploits
                         Problems with encryption:
                          • Lost or corrupted keys
                          • User does not own data




       Ver. 1.0                         Session 15              Slide 21 of 22
CompTIA A+ Certification: Personal Computer Security Concepts and
 Installing Windows XP Professional Using Attended Installation
Supporting Personal Computer Security
 Summary


                  In this session, you learned that :
                      Protecting wireless communications is necessary to have an
                      secure wireless communication.
                      Social engineering is a technique used to obtain confidential
                      information by manipulating the users of computer system.
                      The measures that are necessary to be taken to prevent social
                      engineering attacks.
                      The steps taken to install and configure security measures.
                      The issues to be considered for maintaining and
                      troubleshooting security measures.




       Ver. 1.0                     Session 15                            Slide 22 of 22

Weitere ähnliche Inhalte

Was ist angesagt?

Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02Niit Care
 
Comp tia n+_session_05
Comp tia n+_session_05Comp tia n+_session_05
Comp tia n+_session_05Niit Care
 
Comp tia n+_session_01
Comp tia n+_session_01Comp tia n+_session_01
Comp tia n+_session_01Niit Care
 
Comp tia n+_session_06
Comp tia n+_session_06Comp tia n+_session_06
Comp tia n+_session_06Niit Care
 
Comp tia n+_intro_session
Comp tia n+_intro_sessionComp tia n+_intro_session
Comp tia n+_intro_sessionNiit Care
 
Comp tia a+_session_11
Comp tia a+_session_11Comp tia a+_session_11
Comp tia a+_session_11Niit Care
 
Comp tia a+_session_02
Comp tia a+_session_02Comp tia a+_session_02
Comp tia a+_session_02Niit Care
 
Comp tia n+_session_03
Comp tia n+_session_03Comp tia n+_session_03
Comp tia n+_session_03Niit Care
 
Comp tia a+_session_05
Comp tia a+_session_05Comp tia a+_session_05
Comp tia a+_session_05Niit Care
 
Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Houcheng Lee
 
13.30 hr Hebinck
13.30 hr Hebinck13.30 hr Hebinck
13.30 hr HebinckThemadagen
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionSenetas
 
Skype testing overview
Skype testing overviewSkype testing overview
Skype testing overviewQA Club Kiev
 
Update on Video Conferencing
Update on Video ConferencingUpdate on Video Conferencing
Update on Video ConferencingVideoguy
 
Singularity Rethinking The Software Stack
Singularity    Rethinking The  Software  StackSingularity    Rethinking The  Software  Stack
Singularity Rethinking The Software Stackalanocu
 
Staying ahead of the multi-core revolution with CDT debug
Staying ahead of the multi-core revolution with CDT debugStaying ahead of the multi-core revolution with CDT debug
Staying ahead of the multi-core revolution with CDT debugmarckhouzam
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
Moderne device management door middel van cloud
Moderne device management door middel van cloudModerne device management door middel van cloud
Moderne device management door middel van cloudCompuTrain. De IT opleider.
 
Intel vmcs-shadowing-paper
Intel vmcs-shadowing-paperIntel vmcs-shadowing-paper
Intel vmcs-shadowing-paperAhmed Sallam
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10Yustinus Malawau
 

Was ist angesagt? (20)

Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02
 
Comp tia n+_session_05
Comp tia n+_session_05Comp tia n+_session_05
Comp tia n+_session_05
 
Comp tia n+_session_01
Comp tia n+_session_01Comp tia n+_session_01
Comp tia n+_session_01
 
Comp tia n+_session_06
Comp tia n+_session_06Comp tia n+_session_06
Comp tia n+_session_06
 
Comp tia n+_intro_session
Comp tia n+_intro_sessionComp tia n+_intro_session
Comp tia n+_intro_session
 
Comp tia a+_session_11
Comp tia a+_session_11Comp tia a+_session_11
Comp tia a+_session_11
 
Comp tia a+_session_02
Comp tia a+_session_02Comp tia a+_session_02
Comp tia a+_session_02
 
Comp tia n+_session_03
Comp tia n+_session_03Comp tia n+_session_03
Comp tia n+_session_03
 
Comp tia a+_session_05
Comp tia a+_session_05Comp tia a+_session_05
Comp tia a+_session_05
 
Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)
 
13.30 hr Hebinck
13.30 hr Hebinck13.30 hr Hebinck
13.30 hr Hebinck
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
 
Skype testing overview
Skype testing overviewSkype testing overview
Skype testing overview
 
Update on Video Conferencing
Update on Video ConferencingUpdate on Video Conferencing
Update on Video Conferencing
 
Singularity Rethinking The Software Stack
Singularity    Rethinking The  Software  StackSingularity    Rethinking The  Software  Stack
Singularity Rethinking The Software Stack
 
Staying ahead of the multi-core revolution with CDT debug
Staying ahead of the multi-core revolution with CDT debugStaying ahead of the multi-core revolution with CDT debug
Staying ahead of the multi-core revolution with CDT debug
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
Moderne device management door middel van cloud
Moderne device management door middel van cloudModerne device management door middel van cloud
Moderne device management door middel van cloud
 
Intel vmcs-shadowing-paper
Intel vmcs-shadowing-paperIntel vmcs-shadowing-paper
Intel vmcs-shadowing-paper
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10
 

Ähnlich wie Comp tia a+_session_15

Comp tia a+_session_14
Comp tia a+_session_14Comp tia a+_session_14
Comp tia a+_session_14Niit Care
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierCTE Solutions Inc.
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Comp tia a+_session_04
Comp tia a+_session_04Comp tia a+_session_04
Comp tia a+_session_04Niit Care
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)JosĂŠ Ferreiro
 
Comp tia a+_session_09
Comp tia a+_session_09Comp tia a+_session_09
Comp tia a+_session_09Niit Care
 
VSD Infotech
VSD InfotechVSD Infotech
VSD InfotechVSD infotech
 
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld
 
CoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And DataCoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And DataCoreTrace Corporation
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Jan Ketil Skanke
 
Comp tia a+_session_12
Comp tia a+_session_12Comp tia a+_session_12
Comp tia a+_session_12Niit Care
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02frank4dd
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeLOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeYusuf Hadiwinata Sutandar
 
Microsoft Windows 10 for the Enterprise
Microsoft Windows 10 for the EnterpriseMicrosoft Windows 10 for the Enterprise
Microsoft Windows 10 for the EnterpriseDavid J Rosenthal
 
DigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and BenefitsDigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and BenefitsCodeSigningStore
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 

Ähnlich wie Comp tia a+_session_15 (20)

Comp tia a+_session_14
Comp tia a+_session_14Comp tia a+_session_14
Comp tia a+_session_14
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Comp tia a+_session_04
Comp tia a+_session_04Comp tia a+_session_04
Comp tia a+_session_04
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 
Comp tia a+_session_09
Comp tia a+_session_09Comp tia a+_session_09
Comp tia a+_session_09
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
 
CoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And DataCoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And Data
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
 
Comp tia a+_session_12
Comp tia a+_session_12Comp tia a+_session_12
Comp tia a+_session_12
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeLOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
 
INT 1010 05-1.pdf
INT 1010 05-1.pdfINT 1010 05-1.pdf
INT 1010 05-1.pdf
 
Microsoft Windows 10 for the Enterprise
Microsoft Windows 10 for the EnterpriseMicrosoft Windows 10 for the Enterprise
Microsoft Windows 10 for the Enterprise
 
DigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and BenefitsDigiCert EV Code Signing Certificate Feature and Benefits
DigiCert EV Code Signing Certificate Feature and Benefits
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 

Mehr von Niit Care

Ajs 1 b
Ajs 1 bAjs 1 b
Ajs 1 bNiit Care
 
Ajs 4 b
Ajs 4 bAjs 4 b
Ajs 4 bNiit Care
 
Ajs 4 a
Ajs 4 aAjs 4 a
Ajs 4 aNiit Care
 
Ajs 4 c
Ajs 4 cAjs 4 c
Ajs 4 cNiit Care
 
Ajs 3 b
Ajs 3 bAjs 3 b
Ajs 3 bNiit Care
 
Ajs 3 a
Ajs 3 aAjs 3 a
Ajs 3 aNiit Care
 
Ajs 3 c
Ajs 3 cAjs 3 c
Ajs 3 cNiit Care
 
Ajs 2 b
Ajs 2 bAjs 2 b
Ajs 2 bNiit Care
 
Ajs 2 a
Ajs 2 aAjs 2 a
Ajs 2 aNiit Care
 
Ajs 2 c
Ajs 2 cAjs 2 c
Ajs 2 cNiit Care
 
Ajs 1 a
Ajs 1 aAjs 1 a
Ajs 1 aNiit Care
 
Ajs 1 c
Ajs 1 cAjs 1 c
Ajs 1 cNiit Care
 
Dacj 4 2-c
Dacj 4 2-cDacj 4 2-c
Dacj 4 2-cNiit Care
 
Dacj 4 2-b
Dacj 4 2-bDacj 4 2-b
Dacj 4 2-bNiit Care
 
Dacj 4 2-a
Dacj 4 2-aDacj 4 2-a
Dacj 4 2-aNiit Care
 
Dacj 4 1-c
Dacj 4 1-cDacj 4 1-c
Dacj 4 1-cNiit Care
 
Dacj 4 1-b
Dacj 4 1-bDacj 4 1-b
Dacj 4 1-bNiit Care
 
Dacj 4 1-a
Dacj 4 1-aDacj 4 1-a
Dacj 4 1-aNiit Care
 
Dacj 1-2 b
Dacj 1-2 bDacj 1-2 b
Dacj 1-2 bNiit Care
 
Dacj 1-3 c
Dacj 1-3 cDacj 1-3 c
Dacj 1-3 cNiit Care
 

Mehr von Niit Care (20)

Ajs 1 b
Ajs 1 bAjs 1 b
Ajs 1 b
 
Ajs 4 b
Ajs 4 bAjs 4 b
Ajs 4 b
 
Ajs 4 a
Ajs 4 aAjs 4 a
Ajs 4 a
 
Ajs 4 c
Ajs 4 cAjs 4 c
Ajs 4 c
 
Ajs 3 b
Ajs 3 bAjs 3 b
Ajs 3 b
 
Ajs 3 a
Ajs 3 aAjs 3 a
Ajs 3 a
 
Ajs 3 c
Ajs 3 cAjs 3 c
Ajs 3 c
 
Ajs 2 b
Ajs 2 bAjs 2 b
Ajs 2 b
 
Ajs 2 a
Ajs 2 aAjs 2 a
Ajs 2 a
 
Ajs 2 c
Ajs 2 cAjs 2 c
Ajs 2 c
 
Ajs 1 a
Ajs 1 aAjs 1 a
Ajs 1 a
 
Ajs 1 c
Ajs 1 cAjs 1 c
Ajs 1 c
 
Dacj 4 2-c
Dacj 4 2-cDacj 4 2-c
Dacj 4 2-c
 
Dacj 4 2-b
Dacj 4 2-bDacj 4 2-b
Dacj 4 2-b
 
Dacj 4 2-a
Dacj 4 2-aDacj 4 2-a
Dacj 4 2-a
 
Dacj 4 1-c
Dacj 4 1-cDacj 4 1-c
Dacj 4 1-c
 
Dacj 4 1-b
Dacj 4 1-bDacj 4 1-b
Dacj 4 1-b
 
Dacj 4 1-a
Dacj 4 1-aDacj 4 1-a
Dacj 4 1-a
 
Dacj 1-2 b
Dacj 1-2 bDacj 1-2 b
Dacj 1-2 b
 
Dacj 1-3 c
Dacj 1-3 cDacj 1-3 c
Dacj 1-3 c
 

KĂźrzlich hochgeladen

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

KĂźrzlich hochgeladen (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Comp tia a+_session_15

  • 1. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Objectives In this session, you will learn to: Identify methods for securing wireless communications. Identify appropriate responses to social engineering attacks. Install and configure security measures. Maintain and troubleshoot security measures. Ver. 1.0 Session 15 Slide 1 of 22
  • 2. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Wireless Security Increase in the number of wireless computing devices has given rise to the need for protecting wireless network communications. Ver. 1.0 Session 15 Slide 2 of 22
  • 3. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Wireless Encryption Methods The protocols that are available to encrypt and secure wireless communications are: WEP WTLS 802.1x WPA 802.11i Ver. 1.0 Session 15 Slide 3 of 22
  • 4. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Security Methods for Wireless Access Points The methods that increase the security on wireless access points are: User authentication Data encryption Anitvirus software Security patches MAC filters Static IP Use firewall Change default username Alter or disable SSID Configure vendor’s security settings Ver. 1.0 Session 15 Slide 4 of 22
  • 5. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Wireless Client Configuration Options The options for increasing the security on wireless clients are: • Data encryption • Antivirus software • Security patches • Secure the wireless access point. Ver. 1.0 Session 15 Slide 5 of 22
  • 6. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Social Engineering • Social engineering is a technique used to obtain confidential information by manipulating the computer system users. Ver. 1.0 Session 15 Slide 6 of 22
  • 7. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Social Engineering Attacks • A social engineering attack is a type of attack that uses the steps to gather information from users: 1. Attacker obtains credentials from user 2. Attacker uses credentials to mount attack 1 User name Password 2 Attacker Target Ver. 1.0 Session 15 Slide 7 of 22
  • 8. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Social Engineering Prevention The most effective way to prevent damage from social engineering attacks is to train individuals to recognize and respond to these attacks properly. Types of biometrics are: Fingerprint scan Retinal scan Voice recognition Face recognition Biometric authentication token Ver. 1.0 Session 15 Slide 8 of 22
  • 9. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Install and Configure Security Measures To implement the appropriate security measures you must first install and configure security measures. As a computer support technician you will need to have the security knowledge and skills to install the proper measures so that systems are protected and users can access the resources they need. Ver. 1.0 Session 15 Slide 9 of 22
  • 10. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Windows Security Policies • Windows security policies are Windows configuration settings that control the overall security behavior of the system. Policies set centrally for computer Configuratio n settings Security Settings node in policy object Ver. 1.0 Session 15 Slide 10 of 22
  • 11. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Windows Firewall • Windows Firewall is a software-based firewall available with Service Pack 2 for Windows XP. Ver. 1.0 Session 15 Slide 11 of 22
  • 12. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Software Firewall Configuration Settings • Most software-based firewalls offer configuration settings for common security options, such as: Global security level Application access Security log Unsolicited traffic blocking Ver. 1.0 Session 15 Slide 12 of 22
  • 13. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Computer Security Measures When you select and apply computer security measures, you must: Protect system Protect applications and data Permit legitimate access Ver. 1.0 Session 15 Slide 13 of 22
  • 14. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Activity 15-1 Activity on Configuring Windows Firewall Ver. 1.0 Session 15 Slide 14 of 22
  • 15. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Activity 15-2 Activity on Configuring NTFS Permissions Ver. 1.0 Session 15 Slide 15 of 22
  • 16. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Activity 15-3 Activity on Using File Encryption Ver. 1.0 Session 15 Slide 16 of 22
  • 17. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Maintaining and Troubleshooting Security Measures • System security is a ongoing process, so once the security measures are installed they must be maintained to: To avoid attacks. Troubleshoot in response to user access problems. Address directly or escalate. Ver. 1.0 Session 15 Slide 17 of 22
  • 18. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Common Computer Security Issues The common computer security issues are: BIOS security Biometric security Authentication Malicious software File system security Data access issues Backup security Ver. 1.0 Session 15 Slide 18 of 22
  • 19. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Common Software Firewall Issues • The common software firewall issues are: Disabling Open ports LAN and VPN traffic Firewall conflicts Program dependencies Outgoing traffic User errors Ver. 1.0 Session 15 Slide 19 of 22
  • 20. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Common Wireless Client Configuration Issues The common wireless client configuration issues are: Protocol compatibility WEP SSL on WAP Buffer overflow Viruses Data in plain text Lack of authentication Site surveys Unused connections Ver. 1.0 Session 15 Slide 20 of 22
  • 21. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Common Encryption Issues • The common encryption issues are: Effectiveness of encryption: • Computational power • Size of encryption key • New attacks and exploits Problems with encryption: • Lost or corrupted keys • User does not own data Ver. 1.0 Session 15 Slide 21 of 22
  • 22. CompTIA A+ Certification: Personal Computer Security Concepts and Installing Windows XP Professional Using Attended Installation Supporting Personal Computer Security Summary In this session, you learned that : Protecting wireless communications is necessary to have an secure wireless communication. Social engineering is a technique used to obtain confidential information by manipulating the users of computer system. The measures that are necessary to be taken to prevent social engineering attacks. The steps taken to install and configure security measures. The issues to be considered for maintaining and troubleshooting security measures. Ver. 1.0 Session 15 Slide 22 of 22

Hinweis der Redaktion

  1. You need to tell what is a wireless access point.