Welcome to CAVI, the Cisco Academy for the Vision Impaired. Course Fees Linux Wiki HTML Wiki Documentation Index PmWiki FAQ |
Main /
Chapter 10 - Security10.0 Security10.0.1 Introduction >10.0.1.1 IntroductionThe image on this page shows a a laptop with a chain wrapped around it and secured with a padlock. 10.1 Security Threats10.1.1 Types of Security Threats >10.1.1.1 Adware, Spyware, and PhishingThe figure on this page is an interactive activity that allows the learner match three types of security threats with their definitions. The security threat types are:
The Sedcurity threat definitions are:
The figure also has the following two buttons:
10.1.1 Types of Security Threats >10.1.1.2 Viruses, Worms, Trojans, and RootkitsThe image on this page shows a computer monitor screen that is divided into puzzle pieces with a key inserted into the centre puzzle piece. The words Virus, Worm, and Trojan are listed to the right of the monitor superimposed over a number of lightning bolts that extend from the right edge of the image to the right edge of the monitor. 10.1.1 Types of Security Threats >10.1.1.3 Web SecurityImage 1 on this page shows Windows Internet Explorer 9 browser open with the tools tab selected and Active X Filtering turned on. See page notes for full description. Image 2 on this page shows a the Pop-up Blocker Settings dialog box which include the following options. See page notes for full description:
Image 3 on this page shows Windows Internet Explorer 9 browser open with the tools tab selected and Smart Screen Filter turned on. See page notes for full description. 10.1.1 Types of Security Threats >10.1.1.4 InPrivate BrowsingThe image on this page shows Windows Internet Explorer 9 browser open with the tools tab selected and InPrivate Browsing turned on. See page notes for full description. 10.1.1 Types of Security Threats >10.1.1.5 SpamThe image on this page shows a mailbox overflowing with mail. 10.1.1 Types of Security Threats >10.1.1.6 TCP/IP AttacksFigure 1 on this page is an animation that demonstrates a DoS attack. The animation shows the following devices connected to the Internet:
The DoS Attacker has a callout saying, "I'll send so many pings that the server can't respond to anyone else.". The DoS Attacker sends continuous pings to the web server. The web server then has a callout saying, "Help, I can't accomplish any work!". See page notes for full description. Figure 2 on this page is an animation that demonstrates a Distributed DoS attack. The animation shows the following devices connected to the Internet:
The DoS Attacker has a callout saying, "I have infected computers across the Internet with the DDoS code. I will activate them all now.". The two users' computers have callouts saying, " DoS code activated.". The two users' computers send continuous traffic to the web server. The web server then has a callout saying, "I am overloaded with too much traffic.". See page notes for full description. Figure 3 on this page demonstrates a SYN Flood attack. An attacker sends multiple SYN requests to a web server. The web server sends SYN ACKs and waits to complete the three way handshake but receives no replies. A valid user sends a SYN request to a web server but the web server is unavailable. Figure 4 on this page demonstrates a Man-in-the-Middle attack. The figure shows the following network:
The Man-in-the-Middle attack process is as follows:
10.1.1 Types of Security Threats >10.1.1.7 Worksheet - Security AttacksSee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.1.2 Access to Data and Equipment >10.1.2.1 Social EngineeringThe figure on this page shows a social engineer at a computer with a callout saying, "Hi. This is Amy from the help desk. We need to upgrade the software on our computer after work hours. What is your user ID and password? You can change the password tomorrow when you log in.". An employee of XYZ Corporation at a computer has a callout saying, "Ok, my user ID and password are...". 10.1.2 Access to Data and Equipment >10.1.2.2 Data Wiping, Hard Drive Destruction, and RecyclingImage 1 on this page shows a degaussing wand being applied to the exposed platters of a 3.5 inch internal hard disk. See page notes for full description. Image 2 on this page shows a drill being applied to the exposed platters of a 3.5 inch internal hard disk. See page notes for full description. 10.2 Security Procedures10.2.1 Security Policies >10.2.1.1 What is a Security PolicyThe image on this page shows a company's security policy handbook with the following Emergency Checklist Table of Contents example:
10.2.1 Security Policies >10.2.1.2: Worksheet - Answer Security Policy QuestionsSee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.2.1 Security Policies >10.2.1.3 Security Policy RequirementsThe image on this page shows a company's security policy handbook. 10.2.1 Security Policies >10.2.1.4 Usernames and PasswordsImage 1 on this page shows the Windows BIOS password login screen. Image 2 on this page shows the Windows 7 login screen. Image 3 on this page shows the network login dialog box. 10.2.1 Security Policies >10.2.1.5 Password Requirements(Image 1 on this page shows the Windows 7 Change an Account window displaying the following options:
Image 2 on this page shows the Windows 7 Screen Saver dialog box displaying the following options:
10.2.1 Security Policies >10.2.1.6 File and Folder PermissionsFigure 1 on this page shows a table listing the following Folder Permissions and available control levels:
Figure 2 on this page shows a table listing the following File Level Permissions and available control levels available with NTFS:
Figure 3 on this page shows the following table comparing FAT32 with NTFS:
10.2.1 Security Policies >10.2.1.7: Lab - Securing Accounts, Data, and the Computer in Windows 7See IT Essentials 5.0 Labs and Worksheets Accessible Files 10.2.1 Security Policies >10.2.1.8: Lab - Securing Accounts, Data, and the Computer in Windows VistaSee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.2.1 Security Policies >10.2.1.9: Lab - Securing Accounts, Data, and the Computer in Windows XPSee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.2.2 Protecting Data >10.2.2.1 Software FirewallsImage 1 on this page shows the Windows 7 Firewall settings window which shows that the firewall is active for home or work (private) networks and also active for public networks. Image 2 on this page shows a picture of the New Inbound Rule Wizard window open with the Port rule selected, which controls connections for a TCP or UDP port. See page notes for full description. 10.2.2 Protecting Data >10.2.2.2 Biometrics and Smart CardsImage 1 on this page shows a fingerprint scanner on a door lock with an LCD screen and finger print reader. Image 2 on this page shows a retina scanner with an eye scan in progress. Image 3 on this page shows a smart cards which look like a credit card with a chip on the left side and your photo on the right side. See page notes for full description. Image 4 on this page shows two different Key Fob security devices. One looks like a small usb stick and the other looks like a small circular token. See page notes for full description. 10.2.2 Protecting Data >10.2.2.3 Data BackupsThe image on this page shows the Windows 7 Backup and Restore window listing the following options:
10.2.2 Protecting Data >10.2.2.4 Data EncryptionThe image on this page shows the following example of Encrypting File System with the encrypted folders and files coloured green:
10.2.3 Protection Against Malicious Software >10.2.3.1 Malicious Software Protection ProgramsImage 1 on this page shows the Microsoft Security Essential utility with an alert window displaying a potential threat. Image 2 on this page shows the Windows Defender antispyware utility. Image 3 on this page shows a rogue antivirus advertisement that looks like the Windows Security Alert window. ` 10.2.3 Protection Against Malicious Software >10.2.3.2 Worksheet - Third-Party Antivirus SoftwareSee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.2.3 Protection Against Malicious Software >10.2.3.3 Signature File UpdatesThe image on this page shows the Update tab of the Microsoft Security Essential utility stating that the virus and spyware definitions are up to date. 10.2.4 Security Technoques >10.2.4.1 Common Communication Encryption TypesFigure 1 on this page shows the following example of Hash Encoding:
Figure 2 on this page shows the following example of Symmetric Encryption:
Figure 3 on this page shows the following example of Asymmetric Encryption:
10.2.4 Security Technoques >10.2.4.2 Service Set IdentifiersThe image on this page shows the Basic Wireless settings for the Cisco Linksys E2500 router listing the following options: 5 GHz Wireless Settings:
2.4 GHz Wireless Settings:
10.2.4 Security Technoques >10.2.4.3 MAC Address FilteringThe image on this page shows the Wireless MAC Filter settings for the Cisco Linksys E2500 router listing the following options. See page notes for full description.:
10.2.4 Security Technoques >10.2.4.4 Wireless Security ModesThe image on this page shows the Wireless Security settings for the Cisco Linksys E2500 routerlisting the following options. See page notes for full description:
10.2.4 Security Technoques >10.2.4.5: Packet Tracer - Wireless Security TechniquesThis task cannot be completed as it requires Packet Tracer, which is inaccessible. 10.2.4 Security Technoques >10.2.4.6 Wireless AccessThe image on this page shows the Management settings for the Cisco Linksys E2500 router listing the following options: Router Access:
Local Management Access:
Remote Management Access:
Advanced features:
UPnP:
Backup and Restore:
10.2.4 Security Technoques >10.2.4.7 FirewallsFigure 1 on this pager shows the following table comparing hardware and software firewalls:
Figure 2 on this page is an image showing the Security settings for the Cisco Linksys E2500 router listing the following options: Firewall:
Internet Filter:
Web Filter:
10.2.4 Security Technoques >10.2.4.8: Worksheet - Research Firewalls10.2.4 Security Technoques >10.2.4.9 Port Forwarding and Port TriggeringThe image on this page shows the Single Port Forwarding settings on the Applications and Gaming Tab of the Cisco Linksys E2500 router. See page notes for full description. 10.2.4 Security Technoques >10.2.4.10: Lab - Configure Wireless SecuritySee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.2.5 Protecting Physical Equipment >10.2.5.1 Physical Equipment Protection MethodsImage 1 on this page shows the Windows XP Registry Editor with the Edit DWORD Value dialog box open. The value being edited is AutoRun. See page notes for full description. Image 2 on this page shows the following:
The text on the image states that , "Password (good protection) + BioMetrics or Smart Card (good protection) = Two-Factor Security (much better protection).". 10.2.5 Protecting Physical Equipment >10.2.5.2 Security HardwareImage 1 on this page shows a laptop secured to a desk with a keyed laptop cable lock. In the bottom right corner of the image is a close-up of the mechanism for a combination laptop cable lock. Superimposed over the image is a a coiled keyed laptop cable lock with the lock mechanism at one end and the loop on the other end enlarged. Image 2 on this page shows security screws and locks on a server rack access door. Security screws require specialised tools to remove them. Image 3 on this page shows a pin card which looks like a flat calculator the size of a credit card with an LED display, buttons for the numbers 0 to 9, a menu button, and an ok button. Image 4 on this page shows the dialog box for a software program called Soft Token 2 that is used to generate a single-use login PIN. Image 5 on this page shows a USB security dongle and a security token. 10.2.5 Protecting Physical Equipment >10.2.5.3 Physical Security ActivityThe figure on this page is an interactive activity that allows the learner to match different types of physical security activities with their relevant descriptions. The physical security activities are:
The descriptions are:
The figure also has the following two buttons:
10.3 Common Preventive Maintenance Techniques for Security10.3.1 Security Maintenance >10.3.1.1 Security MaintenanceThe image on this page shows the Windows 7 Update Window displaying a notification telling the user to restart the computer to install important updates. 10.3.1 Security Maintenance >10.3.1.2: Worksheet - Operating System Updates in WindowsSee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.3.1 Security Maintenance >10.3.1.3 Data BackupsThe figure on this page shows the following table listing different types of backup and their descriptions:
10.3.1 Security Maintenance >10.3.1.4: Lab - Data Backup and Recovery in Windows 7See IT Essentials 5.0 Labs and Worksheets Accessible Files 10.3.1 Security Maintenance >10.3.1.5: Lab - Data Backup and Recovery in Windows VistaSee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.3.1 Security Maintenance >10.3.1.6: Lab - Data Backup and Recovery in Windows XPSee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.3.1 Security Maintenance >10.3.1.7 Configuring Firewall TypesThe image on this page shows the Customize Settings window of Windows 7 Firewall. The available options are: Home or work (private) network location settings:
Public network location settings:
10.3.1 Security Maintenance >10.3.1.8: Lab - Configure a Windows 7 FirewallSee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.3.1 Security Maintenance >10.3.1.9: Lab - Configure a Windows Vista FirewallSee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.3.1 Security Maintenance >10.3.1.10: Lab - Configure a Windows XP FirewallSee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.3.1 Security Maintenance >10.3.1.11 Maintaining AccountsThe image on this page shows the lusrmgr.msc window which list all of the local users and groups. 10.4 Basic Troubleshooting Process for Security10.4.1 Applying the Troubleshooting Process to Printers >10.4.1.1 Identify the ProblemThe figure on this page shows the following table listing the first step in troubleshooting security problems:
10.4.1.2(Image1): Shows a picture of a table of Establish a Theory of Probable Cause. 10.4.1 Applying the Troubleshooting Process to Printers >10.4.1.2 Establish a Theory of Probable CauseThe figure on this page shows the following table listing the second step in troubleshooting security problems:
10.4.1 Applying the Troubleshooting Process to Printers >10.4.1.3 Test the Theory to Determine CauseThe figure on this page shows the following table listing the third step in troubleshooting security problems:
10.4.1 Applying the Troubleshooting Process to Printers >10.4.1.4 Establish a Plan of Action to Resolve the Problem and Implement the SolutionThe figure on this page shows the following table listing the fourth step in troubleshooting security problems:
10.4.1 Applying the Troubleshooting Process to Printers >10.4.1.5 Verify Full System Functionality and Implement Preventive MeasuresThe figure on this page shows the following table listing the fifth step in troubleshooting security problems:
10.4.1 Applying the Troubleshooting Process to Printers >10.4.1.6 Document Findings, Actions, and OutcomesThe figure on this page shows the following table listing the sixth step in troubleshooting security problems:
10.4.2 Common Problems and Solutions for Printers >10.4.2.1 Identify Common Problems and SolutionsThe figure on this page shows the following table listing common security problems and solutions:
10.4.2 Common Problems and Solutions for Printers >10.4.2.2: Worksheet - Gather Information fromthe CustomerSee IT Essentials 5.0 Labs and Worksheets Accessible Files 10.5 Security10.5.1 Summary >10.5.1.1 SummaryThe image on this page shows a a laptop with a chain wrapped around it and secured with a padlock. End of Chapter 10: Security. Next - Chapter 11: The IT Professional. |