Professional Documents
Culture Documents
UNIT 6
BASIC SECURITY
8/16/2012
Outcomes 1 :
At the end of this subtopic, student should be able to:
6.1.1 Describe risks of network intrusion.
6.1.2 Detect types of security threat for a given
scenario.
6.1.3 Define sources of network intrusion.
6.1.4 Explain social engineering and phishing in
networking.
8/16/2012
8/16/2012
8/16/2012
8/16/2012
Choice
C
Information Theft
8/16/2012
External Threats
External threats arise from individuals working
8/16/2012
Internal Threats
Internal threats occur when someone has authorized access to
8/16/2012
Social Engineering
Social engineering is a term that refers to the ability of something or
8/16/2012
Pretexting
Pretexting is a form of social engineering where an
10
8/16/2012
Phishing
Phishing is a form of social engineering where the
11
8/16/2012
12
8/16/2012
Outcomes 2 :
At the end of this subtopic, student should be able to:
6.2.1 Describe Viruses, Worms and Trojan Horses.
6.2.2 Identify if the user has been infected by a Virus,
Worm or Trojan Horses for the given scenario.
6.2.3 Explain denial of service and brute force attacks.
6.2.4 Construct a TCP connection to the web server
during a denial of service (DoS) attack.
6.2.5 Differentiate Spyware, Tracking, Cookies, Adware
and Pop-up.
6.2.6 Describe Spam.
13
8/16/2012
Viruses
A virus is a program that runs and spreads by
14
8/16/2012
Worms
A worm is similar to a virus, but unlike a virus
Trojan Horses
A Trojan horse is a non-self replicating program
15
8/16/2012
16
8/16/2012
17
8/16/2012
18
8/16/2012
19
8/16/2012
Brute Force
Not all attacks that cause network outages are
20
8/16/2012
21
8/16/2012
22
8/16/2012
Spyware
Spyware is any program that gathers personal
Tracking Cookies
Cookies are a form of spyware but are not always
23
8/16/2012
Adware
Adware is a form of spyware used to collect information
24
8/16/2012
25
8/16/2012
26
8/16/2012
27
8/16/2012
28
8/16/2012
Outcomes 3 :
At the end of this subtopic, student should be able to:
6.3.1 Define common security measures.
6.3.2 Identify the importance of updated software and
patches.
6.3.3 Complete update software patches and antivirus
latest patterns.
29
8/16/2012
30
8/16/2012
31
8/16/2012
32
8/16/2012
33
8/16/2012
34
8/16/2012
35
8/16/2012
36
8/16/2012
37
8/16/2012
38
8/16/2012
running
39
8/16/2012
Anti-virus Software
Anti-virus software can be used as both a preventative tool and
40
8/16/2012
Anti Spam
Spam is not only annoying; it can overload email servers and
41
8/16/2012
know.
Set up rules in your email to delete spam that by-pass the anti-spam
software.
Identify sources of spam and report it to a network administrator so it
can be blocked.
Report incidents to the governmental agency that deals with abuse by
spam.
42
8/16/2012
43
8/16/2012
Popup Blockers
Popup stopper software can be installed to
44
8/16/2012
45
8/16/2012
QUIZZES
1.
46
8/16/2012
2.
3.
47
8/16/2012
4.
5.
48
8/16/2012
6.
7.
49
8/16/2012
8.
9.
50
8/16/2012
10.
51