IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 16: Advanced Security Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Chapter 16: Objectives Outline security requirements based on customer needs. Select security components based on customer needs. Implement the customer's security plan. Perform preventive maintenance on security. Troubleshoot security. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Chapter 16: Critical Concepts What is this chapter about and why is it important? A school once asked an advisory committee whether they should have a mandatory security course in their program. The response was not only that a mandatory course should be included, but that every computer course should contain a security section, and every computer course topic should include the topic of security. Computer security cannot be touched upon lightly. It is a moral and ethical obligation of any computer technician to ensure that a computer is configured for security and that the user is informed of security best practices. This chapter describes security policies, the security requirements and components that match customer needs, preventive measures that increase security, and ways to configure and troubleshoot security-related issues. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 Chapter 16: Activities What activities are associated with this chapter? 16.1.1 Worksheet: Answer Security Policy Questions 16.2.3 Worksheet: Research Firewalls 16.3.1 Lab: Configure Wireless Security 16.3.2 Lab: Configure Windows XP Firewall 16.3.2 Optional Lab: Configure Windows Vista Firewall 16.4.3 Lab: Data Backup and Recovery in Windows XP 16.4.3 Optional Lab: Data Backup and Recovery in Windows Vista 16.5.3 Lab: Fix a Security Problem 16.5.3 Lab: Remote Technician: Fix a Security Problem 16.5.3 Lab: Troubleshooting Access Security with Windows XP 16.5.3 Optional Lab: Troubleshooting Access Security with Windows Vista Chapter 16 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 Chapter 16: New Terms What terms are introduced in this chapter? Presentation_ID asymmetric encryption 16.2.1 event 16.2.1 firewall 16.1 hardware firewall 16.2.3 local security policy 16.1.1 proxy 16.3.1 security key fob 16.2.2 smart card 16.2.2 software firewall 16.1.3 Symmetric encryption 16.2.1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5 Chapter 16: New Terms What terms are introduced in this chapter? Virus Scan Presentation_ID 16.5.2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6 Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.1.1 Outline a local security policy • Security policy elements Page 16.1.2 Explain when and how to use security hardware • End user instruction Page 16.1.3 Explain when and how to use security application software • End user instruction • Intrusion detection systems Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7 Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.3.1 Configure security settings • Wireless • WEP • WPA • MAC filtering • Routers/access points • MAC filtering • Changing default username and password • Firewalls Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8 Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.3.1 Configure security settings (continued) • Basics of hardware and software firewall configuration • Port assignment/setting up rules • Port forwarding/port triggering • Operating systems • Local users and groups • Vista User Account Control • NTFS permissions vs. share permission • Allow vs. deny • Differentiate between moving and copying files and folders • File attributes • File and folder sharing Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9 Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.3.2 Describe configuring firewall types • Basics of hardware and software firewall configuration • Port assignment • Setting up rules Page 16.4.3 Explain data backup procedures, access to backups, and secure physical backup media • Ntbackup utility Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10 Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.5.1 Review the troubleshooting process • Identify the Problem • Establish a Theory of Probable Causes • Determine an Exact Cause • Implement a Solution • Verify Solution and Full System Functionality • Document Findings Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11 Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.5.2 Identify common problems and solutions • Using antivirus software • Identification of malware symptoms • Quarantine of infected systems • Researching malware types, symptoms, and solutions • Remediation of infected systems • Updating antivirus software and instruct the end user • Signature engine updates • Automatic vs. manual updates • Configuring proxy settings • Ports • IP addresses • Exceptions • Programs Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12 Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.5.2 Identify common problems and solutions (continued) • Configuring firewall settings • Open and closed ports • Program filters • Scheduling scans • Repairing boot blocks • Scan and removal techniques • Safe mode • Boot environment • End user instruction Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13 Chapter 16: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 16.5.2 Identify common problems and solutions (continued) • Configuring operating system • Vista User Account Control • Shared files and folders • Administrative shares vs. local shares • Permission propagation • Inheritance • Data Encryption • User authentication •Securing the system • BIOS security • Drive lock • Passwords • TPM Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14 Chapter 16: Classroom Management Have some students configure wireless NICs and others configure the access point. Reverse roles with different security settings. If time is an issue, bring an access point into the class that is already configured for three different SSIDs. Each SSID has a different security configuration. Students can configure a wireless NIC for each of the SSIDs and show connectivity. Discuss physical security; it is a commonly forgotten topic. It can also be discussed when the security policy is explained. Allow practice time for the class to role-play how they would educate a user on specific security-related issues such as viruses, malware, and phishing. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15 Chapter 16: Teaching Analogies Having a wireless or wired network without security is like leaving your front door unlocked and hoping that no intruder will enter the house. There are software applications that are like a thief who tries your door handle every day. If you do not have good security, eventually the thief will gain access to your computer or home. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16 Chapter 16: Suggested Class Discussions Presentation_ID What are the different methods of encryption? How and when should these encryption methods be used? What are the different methods of authentication? How and when should these authentication methods be used? What are the various file and folder permissions and how should they be used? What is Windows Defender and why is it used? What is port scanning and why is it used? What is war driving and how can you defend against it? What are some different types of security policies? Why is it important to have and follow a security policy? © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17 Chapter 16: Best Practices An employee that has been released from a company has a laptop protected with a fingerprint scanner. Research different vendor methods for recovering access to this laptop that is protected by a fingerprint scanner. Have the students research different Windows security policies. Give the students the following scenarios and have them create the appropriate security policy: • Users in a small company get a lot of e-mail attachments. Create a policy that allows only certain file types to be contained in an e-mail attachment folder. • Set up a software policy that will only affect those users that share a computer, such as part-time staff. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18 Chapter 16: Outside Reading National Security Agency http://www.nsa.gov/ Verisign http://www.verisign.com/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21