IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit,...

Preview:

Citation preview

IT-320 Chapter 16

Network Security

Objectives• 1.                  Define threat, vulnerability, and exploit, explaining how

they relate to each other.

• 2.                  Given a scenario, determine what the threat and vulnerabilities are and decide how to protect your

network from them.

• 3.                  List and define the different types of firewalls available and explain how each protects its network.

• 4.                  Given a scenario, determine how you would use a DMZ.

• 5.                  Compare and contrast private keys and public key encryption.

• 6.                  Compare and contrast digital envelopes, digital signatures, and certificates.

• 7.                  Explain how hash encryption protects data.

• 8.                  Explain how patches can improve network security.

FIGURE 16-1 Types of Attacks as They Relate to the OSI Model

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 16-2 Configuring the Proxy Selection and Proxy Bypass Settings in Internet Explorer

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

a b c

FIGURE 16-3 Configuring the Proxy Settings for Netscape

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 16-4 A DMZ

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

FIGURE 16-5 An ESP Datagram

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

Recommended