Upload
moses-shepherd
View
213
Download
0
Tags:
Embed Size (px)
Citation preview
IT-320 Chapter 16
Network Security
Objectives• 1. Define threat, vulnerability, and exploit, explaining how
they relate to each other.
• 2. Given a scenario, determine what the threat and vulnerabilities are and decide how to protect your
network from them.
• 3. List and define the different types of firewalls available and explain how each protects its network.
• 4. Given a scenario, determine how you would use a DMZ.
• 5. Compare and contrast private keys and public key encryption.
• 6. Compare and contrast digital envelopes, digital signatures, and certificates.
• 7. Explain how hash encryption protects data.
• 8. Explain how patches can improve network security.
FIGURE 16-1 Types of Attacks as They Relate to the OSI Model
Patrick ReganWide Area Networks
Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458
All rights reserved.
FIGURE 16-2 Configuring the Proxy Selection and Proxy Bypass Settings in Internet Explorer
Patrick ReganWide Area Networks
Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458
All rights reserved.
a b c
FIGURE 16-3 Configuring the Proxy Settings for Netscape
Patrick ReganWide Area Networks
Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458
All rights reserved.
FIGURE 16-4 A DMZ
Patrick ReganWide Area Networks
Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458
All rights reserved.
FIGURE 16-5 An ESP Datagram
Patrick ReganWide Area Networks
Copyright ©2004 by Pearson Education, Inc.Upper Saddle River, New Jersey 07458
All rights reserved.