7
IT-320 Chapter 16 Network Security

IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,

Embed Size (px)

Citation preview

Page 1: IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,

IT-320 Chapter 16

Network Security

Page 2: IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,

Objectives• 1.                  Define threat, vulnerability, and exploit, explaining how

they relate to each other.

• 2.                  Given a scenario, determine what the threat and vulnerabilities are and decide how to protect your

network from them.

• 3.                  List and define the different types of firewalls available and explain how each protects its network.

• 4.                  Given a scenario, determine how you would use a DMZ.

• 5.                  Compare and contrast private keys and public key encryption.

• 6.                  Compare and contrast digital envelopes, digital signatures, and certificates.

• 7.                  Explain how hash encryption protects data.

• 8.                  Explain how patches can improve network security.

Page 3: IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,

FIGURE 16-1 Types of Attacks as They Relate to the OSI Model

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

Page 4: IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,

FIGURE 16-2 Configuring the Proxy Selection and Proxy Bypass Settings in Internet Explorer

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

a b c

Page 5: IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,

FIGURE 16-3 Configuring the Proxy Settings for Netscape

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

Page 6: IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,

FIGURE 16-4 A DMZ

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.

Page 7: IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,

FIGURE 16-5 An ESP Datagram

Patrick ReganWide Area Networks

Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458

All rights reserved.