For Dummies 978-0-470-64748-6 Datasheet

Browse online or download Datasheet for Software manuals For Dummies 978-0-470-64748-6. For Dummies CCENT Certification All-In-One User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 26
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
Chapter 1: Network Security
Terminology
In This Chapter
Introduction to security terminology
Identifying types of attacks
Looking at security devices
Mitigating security threats
O
ne of the most important skills to have if you are going to support net-
worked systems or systems connected to the Internet is the ability of
securing systems and networks. In order to be successful as a network pro-
fessional today, you need to have a solid understanding of network security
and ways to protect the network.
I remember when a close friend of mine had his Web site totally replaced
by a hacker. My friend’s Web site files were replaced with inappropriate
content, and he wondered how on Earth someone had hacked his server. It
seems amazing now, but back then (circa 1994) a lot of companies did not
use firewalls because they were not aware of the risks involved in having a
computer connected directly to the Internet. Back then, people thought, “I
have a password on the administrator account, so I am secure.”
In this chapter, you find out about the basic concepts and terminology
related to information system security and network security. Be sure to read
this chapter carefully, and make sure you understand the topics, as you will
be tested on basic security concepts with the CCENT certification exam.
Have fun with this topic area — security is a very exciting field!
22_647486-bk04ch01.indd 44722_647486-bk04ch01.indd 447 10/15/10 11:27 PM10/15/10 11:27 PM
COPYRIGHTED MATERIAL
Page view 0
1 2 3 4 5 6 ... 25 26

Summary of Contents

Page 1 - COPYRIGHTED MATERIAL

Chapter 1: Network Security TerminologyIn This Chapter✓ Introduction to security terminology✓ Identifying types of attacks✓ Looking at security device

Page 2 - Quick Assessment

456Identifying Types of AttacksAlso note that because there are dictionary files for different languages you should not use words found in any diction

Page 3 - Answers

Book IVChapter 1Network Security Terminology457Identifying Types of AttacksDenial of serviceAnother popular network attack is a denial of service (DoS

Page 4 - Authentication

458Identifying Types of Attacks 2. All systems that are pinged reply to the modified source address — an unsuspecting victim. 3. The victim’s system (

Page 5 - Using strong passwords

Book IVChapter 1Network Security Terminology459Identifying Types of AttacksMan-in-the-middleA man-in-the-middle attack involves the hacker interceptin

Page 6 - What about CIA?

460Identifying Types of Attacks To protect against buffer overflow attacks, you need to keep the system, applications, and devices up to date with pat

Page 7

Book IVChapter 1Network Security Terminology461Looking at Security Devicesautomatically, infecting each computer. How the virus spreads depends on the

Page 8 - Social engineering attacks

462Looking at Security Devicesas the destination port is 80, the packet is then allowed or denied access to the network depending on how the firewall

Page 9 - Network-based attacks

Book IVChapter 1Network Security Terminology463Looking at Security DevicesThe first firewall (Firewall1 in Figure 1-4) is connected to the Internet an

Page 10 - Identifying Types of Attacks

464Looking at Security DevicesThere are two main types of intrusion detection systems: ✦ Host-based IDS: This is typically software installed on the

Page 11 - Spoofing

Book IVChapter 1Network Security Terminology465Looking at Security Devices ✦ Disable ports: For security reasons, you need to disable any ports on the

Page 12 - Eavesdropping attack

Quick Assessment448 Quick Assessment 1 (True/False). A packet-filtering firewall checks the state of the conversation. 2 A ______ is responsible f

Page 13 - Buffer overflow

466Mitigating Security Threats VPN protocols are responsible for encrypting the data. Examples of VPN protocols are the Point-to-Point Tunneling Prot

Page 14 - Software-based attacks

Book IVChapter 1Network Security Terminology467Mitigating Security Threats ✦ Patch systems. Be sure to keep your servers up-to-date with patches. This

Page 15 - Looking at Security Devices

468Chapter SummaryChapter SummaryThis chapter covers the fundamental concepts regarding network security. It is an important topic, but understand tha

Page 16

Book IVChapter 1Network Security Terminology469Lab ExercisesTerm Description___ Vulnerability A. Verifying a user’s identity.___ Packet-filtering fire

Page 17 - Intrusion detection system

Prep Test 1 What type of firewall can allow or deny traffic after inspecting the application data in the packet?A ❍ Application-level firewallB ❍ St

Page 18 - Switches

6 What type of attack involves the hacker sending too much data to the applica-tion, which normally results in administrative access within a command

Page 19 - Virtual Private Networks

Answers 1 A. Application-level firewalls can inspect the application-level data, such as what application command is executing, and either allow or de

Page 20 - Mitigating Security Threats

Answers449 Answers 1 False. See “Firewalls.” 2 VPN. Review “Virtual Private Networks.” 3 Authorization. Check out “Authorization.” 4 False. Pe

Page 21

Introduction to Security Terminology450Introduction to Security TerminologyLet me start the discussion by going over some basic security concepts and

Page 22 - Lab Exercises

Book IVChapter 1Network Security Terminology451Introduction to Security TerminologyStrong passwordsIt is really hard to talk about authentication with

Page 23 - Lab 1-2: Types of attacks

452Introduction to Security TerminologyHackers find out about vulnerabilities in the software and hardware devices we use by purposely testing the lim

Page 24 - Network Security Terminology

Book IVChapter 1Network Security Terminology453Identifying Types of Attacksof the data, and there are a number of ways to ensure availability. For exa

Page 25

454Identifying Types of AttacksSocial engineering attacksA social engineering attack occurs when a hacker tries to obtain information or gain access t

Page 26

Book IVChapter 1Network Security Terminology455Identifying Types of Attacks When you are working as a network professional, educate your users never

Comments to this Manuals

No comments