IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 16: Advanced

advertisement
IT Essentials PC Hardware
and Software 4.1
Instructional Resource
Chapter 16: Advanced
Security
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
1
Chapter 16: Objectives
 Outline security requirements based on customer needs.
 Select security components based on customer needs.
 Implement the customer's security plan.
 Perform preventive maintenance on security.
 Troubleshoot security.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
2
Chapter 16: Critical Concepts
 What is this chapter about and why is it important?
 A school once asked an advisory committee whether they should have a mandatory
security course in their program. The response was not only that a mandatory
course should be included, but that every computer course should contain a security
section, and every computer course topic should include the topic of security.
 Computer security cannot be touched upon lightly. It is a moral and ethical obligation
of any computer technician to ensure that a computer is configured for security and
that the user is informed of security best practices. This chapter describes security
policies, the security requirements and components that match customer needs,
preventive measures that increase security, and ways to configure and troubleshoot
security-related issues.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
3
Chapter 16: Activities
 What activities are associated with this chapter?
16.1.1 Worksheet: Answer Security Policy Questions
16.2.3 Worksheet: Research Firewalls
16.3.1 Lab: Configure Wireless Security
16.3.2 Lab: Configure Windows XP Firewall
16.3.2 Optional Lab: Configure Windows Vista Firewall
16.4.3 Lab: Data Backup and Recovery in Windows XP
16.4.3 Optional Lab: Data Backup and Recovery in Windows Vista
16.5.3 Lab: Fix a Security Problem
16.5.3 Lab: Remote Technician: Fix a Security Problem
16.5.3 Lab: Troubleshooting Access Security with Windows XP
16.5.3 Optional Lab: Troubleshooting Access Security with Windows Vista
Chapter 16 Quiz
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
4
Chapter 16: New Terms
 What terms are introduced in this chapter?
Presentation_ID
asymmetric encryption
16.2.1
event
16.2.1
firewall
16.1
hardware firewall
16.2.3
local security policy
16.1.1
proxy
16.3.1
security key fob
16.2.2
smart card
16.2.2
software firewall
16.1.3
Symmetric encryption
16.2.1
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
5
Chapter 16: New Terms
 What terms are introduced in this chapter?
Virus Scan
Presentation_ID
16.5.2
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
6
Chapter 16: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 16.1.1 Outline a local security policy
• Security policy elements
Page 16.1.2 Explain when and how to use security hardware
• End user instruction
Page 16.1.3 Explain when and how to use security application software
• End user instruction
• Intrusion detection systems
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
7
Chapter 16: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 16.3.1 Configure security settings
• Wireless
• WEP
• WPA
• MAC filtering
• Routers/access points
• MAC filtering
• Changing default username and password
• Firewalls
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
8
Chapter 16: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 16.3.1 Configure security settings (continued)
• Basics of hardware and software firewall configuration
• Port assignment/setting up rules
• Port forwarding/port triggering
• Operating systems
• Local users and groups
• Vista User Account Control
• NTFS permissions vs. share permission
• Allow vs. deny
• Differentiate between moving and copying files and folders
• File attributes
• File and folder sharing
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
9
Chapter 16: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 16.3.2 Describe configuring firewall types
• Basics of hardware and software firewall configuration
• Port assignment
• Setting up rules
Page 16.4.3 Explain data backup procedures, access to backups, and secure
physical backup media
• Ntbackup utility
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
10
Chapter 16: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 16.5.1 Review the troubleshooting process
• Identify the Problem
• Establish a Theory of Probable Causes
• Determine an Exact Cause
• Implement a Solution
• Verify Solution and Full System Functionality
• Document Findings
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
11
Chapter 16: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 16.5.2 Identify common problems and solutions
• Using antivirus software
• Identification of malware symptoms
• Quarantine of infected systems
• Researching malware types, symptoms, and solutions
• Remediation of infected systems
• Updating antivirus software and instruct the end user
• Signature engine updates
• Automatic vs. manual updates
• Configuring proxy settings
• Ports
• IP addresses
• Exceptions
• Programs
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
12
Chapter 16: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 16.5.2 Identify common problems and solutions (continued)
• Configuring firewall settings
• Open and closed ports
• Program filters
• Scheduling scans
• Repairing boot blocks
• Scan and removal techniques
• Safe mode
• Boot environment
• End user instruction
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
13
Chapter 16: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 16.5.2 Identify common problems and solutions (continued)
• Configuring operating system
• Vista User Account Control
• Shared files and folders
• Administrative shares vs. local shares
• Permission propagation
• Inheritance
• Data Encryption
• User authentication
•Securing the system
• BIOS security
• Drive lock
• Passwords
• TPM
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
14
Chapter 16: Classroom Management
 Have some students configure wireless NICs and others configure the access point.
Reverse roles with different security settings. If time is an issue, bring an access
point into the class that is already configured for three different SSIDs. Each SSID
has a different security configuration. Students can configure a wireless NIC for
each of the SSIDs and show connectivity.
 Discuss physical security; it is a commonly forgotten topic. It can also be discussed
when the security policy is explained.
 Allow practice time for the class to role-play how they would educate a user on
specific security-related issues such as viruses, malware, and phishing.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
15
Chapter 16: Teaching Analogies
 Having a wireless or wired network without security is like leaving your front door
unlocked and hoping that no intruder will enter the house. There are software
applications that are like a thief who tries your door handle every day. If you do not
have good security, eventually the thief will gain access to your computer or home.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
16
Chapter 16: Suggested Class Discussions
Presentation_ID

What are the different methods of encryption? How and when should these
encryption methods be used?

What are the different methods of authentication? How and when should
these authentication methods be used?

What are the various file and folder permissions and how should they be
used?

What is Windows Defender and why is it used?

What is port scanning and why is it used?

What is war driving and how can you defend against it?

What are some different types of security policies? Why is it important to
have and follow a security policy?
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
17
Chapter 16: Best Practices
 An employee that has been released from a company has a laptop protected with a
fingerprint scanner. Research different vendor methods for recovering access to
this laptop that is protected by a fingerprint scanner.
 Have the students research different Windows security policies.
 Give the students the following scenarios and have them create the appropriate
security policy:
• Users in a small company get a lot of e-mail attachments. Create a policy that
allows only certain file types to be contained in an e-mail attachment folder.
• Set up a software policy that will only affect those users that share a computer,
such as part-time staff.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
18
Chapter 16: Outside Reading
 National Security Agency
http://www.nsa.gov/
 Verisign
http://www.verisign.com/
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
19
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
20
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
21
Download