44
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Chapter 10: Security IT Essentials 5.0

Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

  • Upload
    others

  • View
    11

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1

Chapter 10: Security

IT Essentials 5.0

Presenter
Presentation Notes
Cisco Networking Academy program IT Essentials 5.0 Chapter 10: Security�
Page 2: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Chapter 10 Objectives 10.0 Explain why security is important

10.1 Describe security threats

10.2 Identify security procedures

10.3 Identify common preventive maintenance techniques for security

10.4 Troubleshoot security

Presenter
Presentation Notes
Chapter 10 Objectives
Page 3: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

The Importance of Security

Private information, company secrets, financial data, computer equipment, and items of national security are placed at risk if proper security procedures are not followed.

A technician’s primary responsibilities include data and network security.

Presenter
Presentation Notes
10.0 Explain why security is important Technicians need to understand computer and network security. Private information, company secrets, financial data, computer equipment, and items of national security are placed at risk if proper security procedures are not followed.
Page 4: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Security Threats Potential threats to computer security: Internal threats

•Employees can cause a malicious threat or an accidental threat.

External threats •Outside users can attack in an unstructured or structured way.

Types of attacks to computer security: Physical

•Theft, damage, or destruction to computer equipment.

Data •Removal, corruption, denial of access, unauthorized access, or theft of information.

Presenter
Presentation Notes
10.0.1.1 Introduction
Page 5: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Adware, Spyware and Phishing

Malicious software (malware) is any software designed to damage or to disrupt a system:

Adware - software program that displays advertising on your computer, often displayed in a pop-up window.

Spyware - distributed without user intervention or knowledge, monitors activity on the computer.

Phishing - attacker pretends to represent a legitimate organization and asks for verification of victims information such as password or username.

Presenter
Presentation Notes
10.1 Security Threats 10.1.1.1 Adware, Spyware and Phishing Malicious software (malware) is any software designed to damage or to disrupt a system: Types of malware are; viruses, worms, Trojan Horses, adware, spyware, grayware, and other unwanted software.
Page 6: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Viruses, Worms, Trojans, and Rootkits Virus is a software code that is deliberately created by an

attacker. Viruses may collect sensitive information or may alter or destroy information. A worm is a self-replicating program that uses the network

to duplicate its code to the hosts on the network. At a minimum, worms consume bandwidth in a network. A Trojan is malicious software that is disguised as a

legitimate program. It is named for its method of getting past computer defenses by pretending to be something useful. Anti-virus software is designed to detect, disable, and

remove viruses, worms, and Trojan horses before they infect a computer. A Rootkit is a malicious program that gains full access to a

computer system. Often, a direct attack on a system using a known vulnerability or password.

Presenter
Presentation Notes
10.1.1.2 Viruses, Worms, Trojan Horses, and Rootkits
Page 7: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Web Security Tools that make web pages powerful can make computers vulnerable:

Active X - Controls interactivity on web pages.

Java - Allows applets to run within a browser.

Java Script - Interacts with HTML source code to allow interactive web sites.

Adobe Flash - used to create interactive media (animation, video and games) for the web.

Microsoft Silverlight -used to create rich, interactive media for the web, similar to flash.

Most browsers have settings to help prevent these attacks, for example:

ActiveX filtering Pop-up Blockers SmartScreen Filter (Internet Explorer)

Presenter
Presentation Notes
10.1.1.3 Explain web security Tools that are used to make web pages more powerful and versatile can also make computers more vulnerable to attacks. ActiveX was created by Microsoft to control interactivity on web pages. If ActiveX is on a page, an applet or small program has to be downloaded to gain access to the full functionality. Java is a programming language that allows applets to run within a web browser. Examples of applets include a calculator or a counter. JavaScript is a programming language developed to interact with HTML source code to allow interactive web sites. Examples include a rotating banner or a popup window. Adobe Flash - used to create interactive media (animation, video and games) for the web. Microsoft Silverlight -used to create rich, interactive media for the web, similar to flash. To prevent against these attacks, most browsers have settings that force the computer user to authorize the downloading or use of ActiveX, Java, or JavaScript
Page 8: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

InPrivate Browsing InPrivate browsing prevents the web browser from

storing the following information: • Usernames • Passwords • Cookies • Browsing history • Temporary Internet files • Form data

The browser stores temporary files and cookies but the information is deleted when InPrivate session is ended.

To start InPrivate Browsing in Windows 7: •Right-Click Internet Explorer > Start InPrivate Browsing

Presenter
Presentation Notes
10.1.1.4 InPrivate Browsing
Page 9: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Spam Spam is unsolicited email

that can be used to send harmful links or deceptive content.

Popups are windows that automatically open and are designed to capture your attention and lead you to advertising sites.

Use anti-virus software, options in e-mail software, popup blockers, and common indications of spam to combat these.

Presenter
Presentation Notes
10.1.1.5 Spam Spam, also known as junk mail, is unsolicited e-mail. In most cases, spam is used as a method of advertising. However, spam can be used to send harmful links or deceptive content. When used as an attack method, spam may include links to an infected website or an attachment that could infect a computer. These links or attachments may result in lots of windows designed to capture your attention and lead you to advertising sites. These windows are called popups. Uncontrolled popup windows can quickly cover the user's screen and prevent any work from getting done. To combat spam and phishing, use anti-virus software and setting options in e-mail. Some spam still may get through, so look for these common indications of spam; no subject line, incomplete return address, computer generated e-mails, and return e-mails not sent by the user.
Page 10: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

TCP/IP Attacks TCP/IP suite controls communication on the Internet. Can be

manipulated to prevents users from accessing normal services. • Denial of Service (DoS) - sending enough requests to overload a resource or even stopping its operation.

• Distributed DoS (DDoS) - an attack launched from many computers, called zombies or botnets.

• SYN Flood - randomly opens TCP ports at the source of the attack and ties up the computer with a large amount of false SYN requests.

• Spoofing - uses a forged IP or MAC address to impersonate a trusted computer.

• Man-in-the-Middle - intercepting communications between computers to steal information transiting through the network.

• Replay - data transmissions are intercepted and recorded by an attacker, then replayed to gain access.

• DNS Poisoning - changing DNS records to point to imposter servers.

Presenter
Presentation Notes
10.1.1.6 Explain TCP/IP Attacks TCP/IP is the protocol suite used to control all communications on the Internet. The most common TCP/IP attacks are: Denial of Service (DoS) is a form of attack that prevents users from accessing normal services, such as e-mail or a web server, because the system is busy responding to abnormally large amounts of requests. DoS works by sending enough requests for a system resource that the requested service is overloaded and ceases to operate. Distributed DoS (DDoS) uses many infected computers, called zombies or botnets, to launch an attack. With DDoS, the intent is to obstruct or overwhelm access to the targeted server. Zombie computers located at different geographical locations make it difficult to trace the origin of the attack. SYN Flood randomly opens TCP ports, tying up the network equipment or computer with a large amount of false requests, causing sessions to be denied to others Spoofing - uses a forged IP or MAC address to impersonate a trusted computer. Man-in-the-Middle - intercepting communications between computers to steal information transiting through the network. Replay - data transmissions are intercepted and recorded by an attacker, then replayed to gain access. DNS Poisoning - changing DNS records to point to imposter servers. 10.1.1.7 Worksheet – Security Attacks
Page 11: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Social Engineering

A social engineer is a person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.

To protect against social engineering: • Never give out a password. • Always ask for the ID of the unknown person. • Restrict access of visitors. • Escort all visitors. • Never post your password. • Lock your computer when you leave your desk. • Do not let anyone follow you through a door that

requires an access card.

Presenter
Presentation Notes
10.1.2.1 Social Engineering Social engineering occurs when an attacker tries to gain access to equipment or a network by tricking people into providing the necessary access information. Often, the social engineer gains the confidence of an employee and convinces the employee to divulge username and password information. To protect against social engineering: Never give out your password. Always ask for the ID of unknown persons. Restrict access to visitors. Escort all visitors. Never post your password in your work area. Lock your computer when you leave your desk. Do not let anyone follow you through a door that requires an access card. How many people know someone who writes a password on a note and sticks it to the monitor or under the keyboard?
Page 12: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Hard Drive Disposal and Recycling Erase all hard drives, then use a third-party data wiping tool

to fully erase all data. Degaussing disrupts or eliminates the magnetic field on a

hard drive that allow for the storage of data. A degaussing tool is very expensive and not practical for most users. The only way to fully ensure that data cannot be recovered

from a hard drive is to carefully shatter the platters with a hammer and safely dispose of the pieces. To destroy software media (floppy disks and CDs), use

a shredding machine designed for shredding these materials. Hard Drive Recycling - Hard drives that do not contain

sensitive data can be reformatted and used in other computers.

Presenter
Presentation Notes
10.1.2.2 Data Wiping, Hard Drive Destruction and Recycling Methods are commonly used to either destroy or recycle data and hard drives: Data wiping Degaussing Hard drive destruction Hard drive recycling
Page 13: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Security Policy A security policy should

describe how a company addresses security issues

Questions to answer in writing a local security policy: •What assets require protection? •What are the possible threats? •What should be done in the event of a security breach?

•What training will be in place to educate the end users?

Presenter
Presentation Notes
10.2 Security Procedures 10.2.1.1 What is a Security Policy? A security policy includes the following elements: An acceptable computer usage statement for the organization. The people permitted to use the computer equipment. Devices that are permitted to be installed on a network, as well as the conditions of the installation. Modems and wireless access points are examples of hardware that could expose the network to attacks. Requirements necessary for data to remain confidential on a network. Process for employees to acquire access to equipment and data. This process may require the employee to sign an agreement regarding company rules. It also lists the consequences for failure to comply. 10.2.1.2 Worksheet – Answer Security Policy Questions Teaching Strategy: Security policies describe what to do when faced with many emergencies. It is important to develop and distribute the security policy BEFORE the emergency happens. Local security policies may vary from company to company. They may also vary depending on the device to secure.
Page 14: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Security Policy Requirements A security policy should address these key areas: Process for handling network security incidents

Process to audit existing network security

General security framework for implementing network security

Behaviors that are allowed

Behaviors that are prohibited

What to log and how to store the logs: Event Viewer, system log files, or security log files

Network access to resources through account permissions

Authentication technologies to access data: usernames, passwords, biometrics, and smart cards

Presenter
Presentation Notes
10.2.1.3 Security Policy Requirements The security policy should also provide detailed information about the following issues in case of an emergency: Steps to take after a breach in security Who to contact in an emergency Information to share with customers, vendors, and the media Secondary locations to use in an evacuation Steps to take after an emergency is over, including the priority of services to be restored
Page 15: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Usernames and Passwords

Username and Password policies:

Change the default username for accounts such as administrator or guest.

Network admin defines a naming convention for usernames.

Three levels of password protection are recommended: •BIOS •Login •Network

Presenter
Presentation Notes
10.2.1.4 Usernames and Passwords
Page 16: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Password Requirements Guidelines for creating strong passwords: Length - Use at least eight characters.

Complexity - Include letters, numbers, symbols, and punctuation. Use a variety of keys on the keyboard, not just common letters and characters.

Variation - Change passwords often. Set a reminder to change the passwords you have for email, banking, and credit card websites on the average of every three to four months.

Variety - Use a different password for each site or computer that you use.

Presenter
Presentation Notes
10.2.1.5 Password Requirements
Page 17: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

File and Folder Permissions Permission levels are configured to limit individual or group user

access to specific data.

NTFS – File system that uses journals which are special areas where file changes are recorded before changes are made.

• Can log access by user, date, and time. • Has encryption capability.

FAT 32 - no encryption or journaling

Principle of Least Privilege - only allow users access to the resources they need.

Restricting User Permissions-. If an individual or a group is denied permissions to a network share, this denial overrides any other permissions given.

Presenter
Presentation Notes
10.2.1.6 File and Folder Permissions 10.2.1.7 Lab – Securing Accounts, Data, and the Computer in Windows 7 10.2.1.8 Lab – Securing Accounts, Data, and the Computer in Windows Vista 10.2.1.9 Lab – Securing Accounts, Data, and the Computer in Windows XP
Page 18: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Protecting Data The value of physical equipment is often far less than the value of

the data it contains. To protect data, there are several methods of security protection that can be implemented.

Software Firewall

Smartcard Security

Biometric Security

Data backups

Data encryption

Presenter
Presentation Notes
10.2.2.1 Software Firewall Every communication using TCP/IP is associated with a port number. HTTPS, for instance, uses port 443 by default. A firewall is a way of protecting a computer from intrusion through the ports. The user can control the type of data sent to a computer by selecting which ports will be open and which will be secured. 10.2.2.2 Biometric and Smart Cards Biometric Security compares physical characteristics against stored profiles to authenticate people. A profile is a data file containing known characteristics of an individual such as a fingerprint or a handprint. Common biometric devices available include fingerprint readers, handprint readers, iris scanners, and face recognition devices. Smart cards store private information such as bank account numbers, personal identification, medical records, and digital signatures. Smart cards provide authentication and encryption to keep data safe. 10.2.2.3 Data backups Data backups are one of the most effective ways of protecting against data loss. Establish data backup procedures which account for frequency of backups, storage for data backups, and securing data backups using passwords.
Page 19: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Data Encryption Encryption - data is transformed using a complicated

algorithm to make it unreadable.

Encrypting File System (EFS) is a Windows feature that can encrypt data. BitLocker can encrypt the entire hard drive volume

included in Windows 7 and Windows Vista Ultimate and Enterprise editions.

Trusted Platform Module (TPM) is a specialized chip installed on the motherboard to be used for hardware and software authentication.

•TPM stores information specific to the host system, such as encryption keys, digital certificates, and passwords.

Presenter
Presentation Notes
10.2.2.4 Data Encryption
Page 20: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Malware Software Protection Programs

Malware is malicious software that is installed on a computer without the knowledge or permission of the user.

It may take several different anti-malware programs and multiple scans to completely remove all malicious software.

Anti-malware available for these purpose are: Anti-virus, anti-spyware, anti-adware, and phishing programs.

Presenter
Presentation Notes
10.2.3.1 Malware Software Protection Programs 10.2.3.2 Worksheet – Third-Party Antivirus Software
Page 21: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Signature File Updates

New viruses are always being developed, therefore security software must be continually updated.

Presenter
Presentation Notes
10.2.3.3 Signature File Updates
Page 22: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Common Communication Encryption Types

Hash Encoding uses a mathematical function to create a numeric value that is unique to the data. Symmetric Encryption requires both sides of

an encrypted conversation to use an encryption key to encode and decode the data. Asymmetric Encryption requires two keys, a

private key and a public key.

Presenter
Presentation Notes
10.2.4.1 Common Communication Encryption Types
Page 23: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Service Set Identifiers

The Service Set Identifier (SSID) is the name of the wireless network. A wireless router or access point broadcasts the SSID by default so that wireless devices can detect the wireless network.

To disable SSID broadcasting, use the following path, as shown in the figure:

Wireless > Basic Wireless Settings > select Disabled for SSID Broadcast > Save Settings > Continue

Disabling the SSID broadcast provides very little security. If the SSID broadcast is disabled, each computer user that wants to connect to the wireless network must enter the SSID manually. When a computer is searching for a wireless network, it will broadcast the SSID.

Presenter
Presentation Notes
10.2.4.2 Service Set Identifiers
Page 24: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Mac Address Filtering

MAC address filtering is a technique used to deploy device-level security on a wireless LAN.

Presenter
Presentation Notes
10.2.4.3 Mac Address Filtering
Page 25: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Wireless Security Modes

Wired Equivalent Privacy (WEP) – The first generation security standard for wireless. Attackers quickly discovered that WEP encryption was easy to break.

Wi-Fi Protected Access (WPA) An improved version of WEP, uses much stronger encryption. Wi-Fi Protected Access 2 (WPA2) WPA2 supports

robust encryption, providing government-grade security.

Presenter
Presentation Notes
10.2.4.4 Wireless Security Modes 10.2.4.5 Packet Tracer – Wireless Security Techniques
Page 26: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 26 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Wireless Access Wireless Antennae

• Avoid transmitting signals outside of the network area by installing an antenna with a pattern that serves your network users.

Network Device Access • On first connection to the network device, change the default

username and password.

Wi-Fi Protected Setup (WPS) • The user connects to the wireless router using the factory-set

PIN that is either printed on a sticker or shown on a display. • Software has been developed that can intercept traffic and

recover the WPS PIN and the pre-shared encryption key. Disable WPS on the wireless router if possible.

Presenter
Presentation Notes
10.2.4.6 Wireless Access
Page 27: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 27 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Firewalls

Presenter
Presentation Notes
10.2.4.7 Firewalls A hardware firewall passes two different types of traffic into your network: Responses to traffic that originates from inside your network Traffic destined for a port that you have intentionally left open There are several types of hardware firewall configurations: Packet filter - Packets cannot pass through the firewall, unless they match the established rule set configured in the firewall. Traffic can be filtered based on different attributes, such as source IP address, source port or destination IP address or port. Traffic can also be filtered based on destination services or protocols such as WWW or FTP. Stateful packet inspection - This is a firewall that keeps track of the state of network connections traveling through the firewall. Packets that are not part of a known connection are dropped. Application layer - All packets traveling to or from an application are intercepted. All unwanted outside traffic is prevented from reaching protected devices. Proxy - This is a firewall installed on a proxy server that inspects all traffic and allows or denies packets based on configured rules. A proxy server is a server that is a relay between a client and a destination server on the Internet. Demilitarized Zone A DMZ is a subnetwork that provides services to an untrusted network. An email, web, or FTP server is often placed into the DMZ so that the traffic using the server does not come inside the local network. This protects the internal network from attacks by this traffic, but does not protect the servers in the DMZ in any way. 10.2.4.8 Worksheet – Research Firewalls
Page 28: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 28 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Port Forwarding and Port Triggering Port forwarding is a rule-based method of directing

traffic between devices on separate networks: •Used when specific ports must be opened so that certain programs and applications can communicate with devices on different networks.

•Router determines if the traffic should be forwarded to a certain device based on the port number found with the traffic. For example HTTP – Port 80.

Port triggering allows the router to temporarily forward data through inbound ports to a specific device.

•For example, a video game might use ports 27000 to 27100 for connecting with other players. These are the trigger ports.

Presenter
Presentation Notes
10.2.4.9 Port Forwarding and Port Triggering 10.2.4.10 Lab – Configure Wireless Security
Page 29: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 29 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Physical Equipment Protection Methods

Physical security is as important as data security. Network infrastructure can be protected by:

• Secured telecommunications rooms, equipment cabinets, and cages • Cable locks and security screws for hardware devices • Wireless detection for unauthorized access points • Hardware firewalls • Network management system that detects changes in wiring and patch panels

Two- factor Authentication - secured using overlapping protection techniques to prevent unauthorized access to sensitive data.

• An example of two-factor authentication is using a password and a smart card to protect an asset.

Presenter
Presentation Notes
10.2.5.1 Physical Equipment Protection Methods: When a computer is stolen, the data is also stolen. There are several methods of physically protecting computer and network equipment: Secured telecommunications rooms, equipment cabinets, and cages Cable locks and security screws for hardware devices Wireless detection for unauthorized access points Hardware firewalls Network management system that detects changes in wiring and patch panels Disabling AutoRun By disabling the AutoRun feature on Windows XP, a user can minimize the security risk from a malicious program running automatically when new media is connected to the computer. Two-factor Authentication Computer equipment and data can be secured using overlapping protection techniques to prevent unauthorized access to sensitive data. An example of overlapping protection is using a password and a smart card to protect an asset. Teaching Strategy: Since stealing the whole PC is the easiest way to steal data; physical computer equipment must be secured.
Page 30: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 30 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Security Hardware

There are several methods of physically protecting computer equipment: • Use cable locks with equipment. • Keep telecommunication rooms locked. • Fit equipment with security screws. • Use security cages around equipment. • Label and install sensors, such as Radio Frequency Identification (RFID) tags, on

equipment. • Install physical alarms triggered by motion-detection sensors. • Use webcams with motion-detection and surveillance software.

For access to facilities, there are several means of protection: • Card keys that store user data, including level of access • Biometric sensors that identify physical characteristics of the user, such as fingerprints or

retinas • Posted security guard • Sensors, such as RFID tags, to monitor equipment

Presenter
Presentation Notes
10.2.5.2 Security Hardware 10.2.5.3 Physical Security Activity
Page 31: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 31 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Service Packs and Security Patches Regular security updates are essential to

combat new viruses or worms.

A technician should understand how and when to install patches and updates.

Patches are code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack

A Service Pack is a combination of patches and updates.

Windows automatically downloads and installs updates

by default or can be controlled locally; • Start > All Programs > Windows Update > Change settings

Presenter
Presentation Notes
10.3 Common Preventive Maintenance Techniques for Security 10.3.1.1 Operating System Service Packs and Security Patches 10.3.1.2 Worksheet – Operating System Updates in Windows Teaching Strategy: Attackers methods are constantly changing. As new exploits are discovered, manufacturers create patches and new procedures. The technician must be able to install these and the user should know how to recognize when updates are needed.
Page 32: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 32 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Data Backup Windows backups can be done manually or scheduled

to takes place automatically.

To start the Windows 7 Backup Files wizard for the first time, use the following path:

Start> All Programs > Maintenance >Backup and Restore >Set up backup

Presenter
Presentation Notes
10.3.1.3 Data Backup 10.3.1.4 Lab – Data Backup and Recovery in Windows 7 10.3.1.5 Lab – Data Backup and Recovery in Windows Vista 10.3.1.6 Lab – Data Backup and Recovery in Windows XP
Page 33: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 33 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Configuring Firewall Types

A Firewall selectively denies traffic to a computer or network segment.

Restrictive security policy - A firewall that opens only the required ports. Any packet not explicitly permitted is denied.

Configuring the Windows 7 or Windows Vista firewall can be completed in two ways:

•Automatically - The user is prompted to Keep Blocking, Unblock, or Ask Me Later for unsolicited requests.

•Manage Security Settings – the user adds the program or ports that are required for the applications in use on the network.

Presenter
Presentation Notes
10.3.1.7 Configuring Firewall Types 10.3.1.8 Lab – Configure a Windows 7 Firewall 10.3.1.9 Lab – Configure a Windows Vista Firewall 10.3.1.10 Lab – Configure a Windows XP Firewall
Page 34: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 34 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Maintaining Accounts Group employees by job requirements to give access to

files by setting up group permissions.

When an employee leaves an organization, access to the network should be terminated immediately.

Guests can be given access through a Guest account.

To configure all of the users and groups on a computer, type lusrmgr.msc in the Search box, or Run Line utility.

Presenter
Presentation Notes
10.3.1.11 Maintaining Accounts
Page 35: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 35 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Troubleshooting Process Step 1 Identify the problem Step 2 Establish a theory of probable causes Step 3 Test the Theory to Determine cause Step 4 Establish a Plan of Action to Resolve the Problem

and Implement the Solution Step 5 Verify Full System Functionality and Implement

Preventative Measures Step 6 Document Findings, Actions, and Outcomes

Presenter
Presentation Notes
10.4 Applying the Troubleshooting Process to Security
Page 36: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 36 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Step 1 - Identify the Problem System Information

• Manufacturer, model, OS, network environment, connection type

Open-ended questions •When did the problem start? •What problems are you experiencing? •What websites have you visited recently? •What security software is installed in your computer? •Who else has used your computer recently?

Closed-ended questions (Can be answered with a ‘yes’ or ‘no’) •Is your security software up to date? •Have you scanned your computer recently for viruses? •Did you open any attachments from a suspicious e-mail? •Have you changed your password recently? •Have you shared your password?

Presenter
Presentation Notes
10.4.1 Applying the Troubleshooting Process to Security 10.4.1.1 Identify the Problem
Page 37: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 37 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Step 2 - Establish a Theory of Probable Cause Create a list of the most common causes of security problems:

•Virus

•Trojan Horse

•Worm

•Spyware

•Adware

•Grayware or Malware

•Phishing scheme

•Password compromised

•Unprotected equipment rooms

•Unsecured work environment

Presenter
Presentation Notes
10.4.1 Applying the Troubleshooting Process to Security 10.4.1.2 Establish a Theory of Probable Cause
Page 38: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 38 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Test theories of probable cause one at a time, starting with the quickest and easiest.

•Disconnect from the network •Update anti-virus and spyware signatures •Scan computer with protection software •Check computer for the latest OS patches and updates •Reboot the computer or network device •Login as a different user to change your password •Secure equipment rooms •Secure work environment •Enforce security policy

If the exact cause of the problem has not been determined after all theories have been tested, establish a new theory of probable cause and test it.

Step 3 - Test the Theory to Determine cause

Presenter
Presentation Notes
10.4.1 Applying the Troubleshooting Process to Security 10.4.1.3 Determine the exact cause
Page 39: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 39 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

• After determining the exact cause of the problem, establish a plan of action to resolve the problem and implement a solution.

Sometimes quick procedures can determine the exact cause of the problem or even correct the problem.

If a quick procedure does not correct the problem, you might need to research the problem further to establish the exact cause.

Step 4 - Establish a Plan of Action to Resolve the Problem and Implement the Solution

Presenter
Presentation Notes
10.4.1 Applying the Troubleshooting Process to Security 10.4.1.4 Establish a Plan of Action to Resolve the Problem and Implement a Solution If a quick procedure does correct the problem, you can go to step 5 to verify the solution and full system functionality. Evaluate the problem and research possible solutions. Divide larger problems into smaller problems that can be analyzed and solved individually. Prioritize solutions starting with the easiest and fastest to implement. Check: Helpdesk repair logs Other techs Manufacturer FAQs Technical websites News groups Computer manuals Device manuals Online forums Internet search
Page 40: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 40 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Verify full system functionality and implement any preventive measures if needed.

•Re-scan computer to ensure no viruses remain. •Re-scan computer to ensure no spyware remains. •Check the security software logs to ensure no problems remain. •Test network and Internet connectivity. •Ensure all application are working. •Verify access to authorized resources such as shared printer and databases..

•Make sure entries are secured. •Ensure security policy is enforced.

Have the customer verify the solution and system functionality.

Step 5 - Verify Full System Functionality and Implement Preventative Measures

Presenter
Presentation Notes
10.4.1 Applying the Troubleshooting Process to Security 10.4.1.5 Verify Solution and System Functionality NOTE: Never ask a customer to reveal a password. If you need to access a computer and the customer cannot stay nearby, have the customer create a temporary password. Advise the customer to reset the password when the repair is complete.
Page 41: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 41 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Discuss the solution with the customer

Have the customer confirm that the problem has been solved

Document the process: •Problem description •Solution •Components used •Amount of time spent in solving the problem

Step 6 - Document Findings, Actions, and Outcomes

Presenter
Presentation Notes
10.4.1 Applying the Troubleshooting Process to Security 10.4.1.6 Document Findings
Page 42: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 42 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Common Problems and Solutions

See chart in curriculum of Common Security Problems and Solutions

Presenter
Presentation Notes
10.4.2.1 Identify common problems and solutions [Direct the students to the curriculum to see all the charts explaining more common problems and solutions] 10.4.2.2 Worksheet – Gather Information from the Customer Computer problems can be attributed to hardware, software, connectivity issues, or some combination of the three. You will resolve some types of computer problems more often than others. The worksheet is designed to reinforce your communication skills to verify information from the customer.
Page 43: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 43 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Chapter 10 Summary Following proper security procedures will protect

computers and network equipment, and the data they contain, from physical danger such as fire and theft, as well as from loss and damage by employees and attackers.

Security threats can come from inside or outside of an organization.

Viruses and worms are common threats that attack data.

Develop and maintain a security plan to protect both data and physical equipment from loss.

Keep operating systems and applications up to date and secure with patches and service packs.

Presenter
Presentation Notes
Chapter 10 Summary
Page 44: Chapter 10: Security - cnacad.com v5.0/Chapter 10/ITE_50_Chapter10.pdf · With DDoS, the intent is to obstruct or overwhelm \ൡccess to the targeted server. Zombie computers located

Presentation_ID 44 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential