ICANWK406A Install, configure and test network security
|
|
- Leo Weaver
- 5 years ago
- Views:
Transcription
1 ICANWK406A Install, configure and test network security Release: 1
2 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications Technology Training Package version 1.0 Unit Descriptor This unit describes the performance outcomes, skills and knowledge required to install, configure and test network security in an information and communications technology (ICT) network. Application of the Unit This unit applies to information technology (IT) professionals who install, configure and test secure networks of any size. Licensing/Regulatory Information No licensing, legislative, regulatory or certification requirements apply to this unit at the time of endorsement but users should confirm requirements with the relevant federal, state or territory authority. Pre-Requisites Not applicable. Employability Skills Information This unit contains employability skills. Approved Page 2 of 12
3 Elements and Performance Criteria Pre-Content Element Performance Criteria Elements describe the essential outcomes of a unit of competency. Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the required skills and knowledge section and the range statement. Assessment of performance is to be consistent with the evidence guide. Approved Page 3 of 12
4 Elements and Performance Criteria 1. Assess network security threats and vulnerabilities to identify risk 2. Implement countermeasures for identified vulnerabilities and threats 3. Test and verify functionality and performance of security system implemented 4. Provide systems for monitoring and maintaining security 1.1 Assess and report on current system security, according to required asset security level 1.2 Determine additional network, software, hardware and system security threats and vulnerabilities 1.3 Use identified threats and vulnerability information to identify security risks 1.4 Make recommendations to management to address security deficiencies, according to current and future commercial and business requirements 2.1 Implement required level of perimeter security based on current and future business needs 2.2 Assess and implement best practice server and network hardening techniques and measures 2.3 Implement secure authentication and user account controls 2.4 Secure data integrity and transmission 3.1 Design test items to verify key function and performance measures against criteria 3.2 Conduct function and performance tests recording results 3.3 Modify and debug security system as necessary 3.4 Develop documentation on current system settings and file for future reference 4.1 Monitor current network security, including physical aspects, using appropriate third-party testing software where applicable 4.2 Review logs and audit reports to identify and record security incidents, intrusions or attempts 4.3 Carry out spot checks and audits to ensure that procedures are not being bypassed 4.4 Document newly discovered security threats, vulnerabilities and risks in a report for presentation to appropriate person to gain approval for changes to be made Approved Page 4 of 12
5 Required Skills and Knowledge This section describes the skills and knowledge required for this unit. Required skills analytical skills to: analyse systems evaluation review system security logs for breaches communication skills to liaise with clients literacy skills to write reports for evaluating system security status according to organisational security policies numeracy skills to undertake a cost-benefit comparison problem-solving skills to: determine intrusion detection troubleshoot and debug research skills to identify and analyse network security methodologies and technologies technical skills to: develop enterprise policies strategies and procedures implement local area network (LAN), wide area network (WAN), virtual private network (VPN) and wireless local area network (WLAN) solutions implement security strategies and configure network security software and hardware install hardware and software related to improving network security undertake a network security risk assessment. Required knowledge authentication issues overview knowledge of: client business domain, including client organisation structure and business functionality features and capabilities of networking technologies privacy issues and privacy legislation security information sources risk analysis common VPN issues, including bandwidth and dynamic security environment configuring routers and switches current industry-accepted hardware and software security products, with broad knowledge of general features and capabilities function and operation of VPN concepts, including encryption, firewalls, packet tunnelling and authentication network protocols and operating systems organisational issues surrounding security security perimeters and their functions security protocols, standards and data encryption Approved Page 5 of 12
6 security threats, including eavesdropping, data interception, data corruption, data falsification types of VPNs, including site-to-site, user-to-site internet traffic and extranets systems and procedures related to: audit and intrusion detection systems auditing and penetration testing techniques cryptography LAN, WLAN and WAN screened subnets transmission control protocols or internet protocols (TCPs/IPs) and applications use of virus detection software. Approved Page 6 of 12
7 Evidence Guide The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package. Overview of assessment Critical aspects for assessment and evidence required to demonstrate competency in this unit Context of and specific resources for assessment Evidence of the ability to: assess and identify security threats, vulnerabilities and risks determine appropriate countermeasure for threat, vulnerability or risk implement countermeasure per threat or risk install, configure and test network elements to ensure perimeter security test and verify function and performance of selected security measures monitor network for suspicious activity taking appropriate action where necessary document newly discovered threats, vulnerabilities and risks, including change recommendations for approval. Assessment must ensure access to: site where secure network installation may be conducted network security documentation equipment specifications network components hardware and software firewalls (hardware and software) live network organisational guidelines networked (LAN) computers WAN service point of presence appropriate learning and assessment support when required. Where applicable, physical resources should include equipment modified for people with special needs. Method of assessment A range of assessment methods should be used to assess practical skills and knowledge. The following examples are appropriate for this unit: documentation of current system security analysis that outlines required enterprise security requirements identification of additional security threats and vulnerabilities Approved Page 7 of 12
8 Guidance information for assessment verbal or written questioning to assess candidate s knowledge of network security direct observation of candidate performing tasks required to successfully install, configure and test a secure network direct observation of candidate performing tasks required to successfully test function and performance of secure network direct observation of candidate performing tasks required to successfully monitor and document newly discovered security threats, vulnerabilities and risks. Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, where appropriate. Assessment processes and techniques must be culturally appropriate, and suitable to the communication skill level, language, literacy and numeracy capacity of the candidate and the work being performed. Indigenous people and other people from a non-english speaking background may need additional support. In cases where practical assessment is used it should be combined with targeted questioning to assess required knowledge. Approved Page 8 of 12
9 Range Statement The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. System may include: applications databases gateways operating systems servers WAN communication links workstations. Asset may include: data and information intellectual property physical assets. Network may include: intranets large and small LANs internet VPNs WANs WLANs. Software may include: applications: commercial customised in-house packaged encryption modules operating systems security: antivirus firewall spyware utilities: audit network monitoring. Hardware may include: analog modems digital subscriber line (DSL) modems firewall devices Approved Page 9 of 12
10 Security threats may include: Vulnerabilities may relate to: Commercial and business requirements may include: Perimeter security may include: network cabling wired and wireless networks notebooks personal computers routers servers switches workstations. by-pass denial of service eavesdropping elevation of privilege hacking impersonation manipulation penetration repudiation viruses or malicious code. application bugs communications devices firmware flaws firewall misconfigurations operating system bugs poor bandwidth control measures transmitting data in plain text unnecessary services and protocols weak authentication techniques weak permissions weak physical security. availability backup and recovery of data confidentiality firewalls hacking prevention integrity password logons remote access to internal network. access control auditing authentication authorisation Approved Page 10 of 12
11 hardware or software firewalls identification network address translation (NAT) surveillance. Server may include: application web file and print firewall file transfer protocol (FTP) proxy, cache voice over internet protocol (VoIP). Hardening techniques may include: Data integrity may include: Document may include: Appropriate person may include: demilitarised zones (DMZ) encryption intrusion detection system (IDS) operating system patch application and management rigid shared resource permissions service pack application strong firewall configurations, including unused port blocking strong physical security strong user authentication techniques unused services and protocols disablement. encryption hash encoding protocol control VPN. audit trails International Organization for Standardization (ISO), International Electrotechnical Commission (IEC) and Australian Standards (AS) standards naming standards project management templates report writing principles security analysis report version control. supervisor authorised business representative client. Approved Page 11 of 12
12 Unit Sector(s) Networking Approved Page 12 of 12
ICAB5238B Build a highly secure firewall
ICAB5238B Build a highly secure firewall Release: 1 ICAB5238B Build a highly secure firewall Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines the competency required
ICAWEB423A Ensure dynamic website security
ICAWEB423A Ensure dynamic website security Release: 1 ICAWEB423A Ensure dynamic website security Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications
ICASAS505A Review and update disaster recovery and contingency plans
ICASAS505A Review and update disaster recovery and contingency plans Release: 1 ICASAS505A Review and update disaster recovery and contingency plans Modification History Release Release 1 Comments This
Release: 1. ICANWK607A Design and implement wireless network security
Release: 1 ICANWK607A Design and implement wireless network security ICANWK607A Design and implement wireless network security Modification History Release Release 1 Comments This Unit first released with
Release: 1. ICANWK502A Implement secure encryption technologies
Release: 1 ICANWK502A Implement secure encryption technologies ICANWK502A Implement secure encryption technologies Modification History Release Release 1 Comments This Unit first released with ICA11 Information
Release: 1. ICASAS407A Conduct pre-installation audit for software installation
Release: 1 ICASAS407A Conduct pre-installation audit for software installation ICASAS407A Conduct pre-installation audit for software installation Modification History Release Release 1 Comments This Unit
Release: 1. ICADBS603A Determine suitability of database functionality and scalability
Release: 1 ICADBS603A Determine suitability of database functionality and scalability ICADBS603A Determine suitability of database functionality and scalability Modification History Release Release 1 Comments
ICAWEB405A Monitor traffic and compile website traffic reports
ICAWEB405A Monitor traffic and compile website traffic reports Release: 1 ICAWEB405A Monitor traffic and compile website traffic reports Modification History Release Release 1 Comments This Unit first
Release: 1. ICADBS502A Design a database
Release: 1 ICADBS502A Design a database ICADBS502A Design a database Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications Technology Training
How To Manage A Network Safely
ICANWK303A Configure and administer a network operating system Release: 1 ICANWK303A Configure and administer a network operating system Modification History Release Release 1 Comments This Unit first
ICANWK402A Install and configure virtual machines for sustainable ICT
ICANWK402A Install and configure virtual machines for sustainable ICT Release: 1 ICANWK402A Install and configure virtual machines for sustainable ICT Modification History Release Release 1 Comments This
Release: 1. ICAPRG426A Prepare software development review
Release: 1 ICAPRG426A Prepare software development review ICAPRG426A Prepare software development review Modification History Release Release 1 Comments This Unit first released with ICA11 Information
ICASAS420A Provide first-level remote help-desk support
ICASAS420A Provide first-level remote help-desk support Release: 1 ICASAS420A Provide first-level remote help-desk support Modification History Version ICASAS420A Comments This version first released with
Release: 1. ICAPRG514A Prepare for software development using rapid application development
Release: 1 ICAPRG514A Prepare for software development using rapid application development ICAPRG514A Prepare for software development using rapid application development Modification History Release Release
ICTTEN4051A Install configuration programs on PC based customer equipment
ICTTEN4051A Install configuration programs on PC based customer equipment Release: 1 ICTTEN4051A Install configuration programs on PC based customer equipment Modification History Not Applicable Unit Descriptor
Release 1. ICAICT814A Develop cloud computing strategies for a business
Release 1 ICAICT814A Develop cloud computing strategies for a business ICAICT814A Develop cloud computing strategies for a business Modification History Release Release 1 Comments This version first released
ICTTEN5204A Produce technical solutions from business specifications
ICTTEN5204A Produce technical solutions from business specifications Release: 1 ICTTEN5204A Produce technical solutions from business specifications Modification History Not Applicable Unit Descriptor
Release: 1. ICADBS412A Build a database
Release: 1 ICADBS412A Build a database ICADBS412A Build a database Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications Technology Training
ICANWK602A Plan, configure and test advanced server based security
ICANWK602A Plan, configure and test advanced server based security Release: 1 ICANWK602A Plan, configure and test advanced server based security Modification History Release Release 1 Comments This Unit
ICANWK616A Manage security, privacy and compliance of cloud service deployment
ICANWK616A Manage security, privacy and compliance of cloud service deployment Release 1 ICANWK616A Manage security, privacy and compliance of cloud service deployment Modification History Release Release
ICANWK613A Develop plans to manage structured troubleshooting process of enterprise networks
ICANWK613A Develop plans to manage structured troubleshooting process of enterprise networks Release: 1 ICANWK613A Develop plans to manage structured troubleshooting process of enterprise networks Modification
ICANWK403A Manage network and data integrity
ICANWK403A Manage network and data integrity Release: 1 ICANWK403A Manage network and data integrity Modification History Release Release 1 Comments This Unit first released with ICA11 Information and
Monitor and administer network security
ICAS4124A Unit Descriptor Unit Sector Monitor and administer network security This unit defines the competency required to monitor and administer security functions on a network according to organisational
ICTTEN2209A Build and maintain a secure network
ICTTEN2209A Build and maintain a secure network Release: 1 ICTTEN2209A Build and maintain a secure network Modification History Not Applicable Unit Descriptor Unit descriptor This unit describes the performance
Release: 1. ICAWEB509A Use site server tools for transaction management
Release: 1 ICAWEB509A Use site server tools for transaction management ICAWEB509A Use site server tools for transaction management Modification History Release Release 1 Comments This Unit first released
ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network
ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and
Release: 1. ICADBS601A Build a data warehouse
Release: 1 ICADBS601A Build a data warehouse ICADBS601A Build a data warehouse Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications Technology
ICADBS402A Complete database backup and restore
ICADBS402A Complete database backup and restore Release: 1 ICADBS402A Complete database backup and restore Modification History Version ICADBS402A Comments This version first released with ICA11 Information
Release: 1. ICAICT604A Identify and implement business innovation
Release: 1 ICAICT604A Identify and implement business innovation ICAICT604A Identify and implement business innovation Modification History Release Release 1 Comments This Unit first released with ICA11
ICANWK501A Plan, implement and test enterprise communication solutions
ICANWK501A Plan, implement and test enterprise communication solutions Release: 1 ICANWK501A Plan, implement and test enterprise communication solutions Modification History Release Release 1 Comments
ICANWK401A Install and manage a server
ICANWK401A Install and manage a server Release: 1 ICANWK401A Install and manage a server Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications
ICANWK610A Design and build integrated VoIP networks
ICANWK610A Design and build integrated VoIP networks Release: 1 ICANWK610A Design and build integrated VoIP networks Modification History Release Release 1 Comments This Unit first released with ICA11
ICAICT107A Use personal productivity tools
ICAICT107A Use personal productivity tools Release: 1 ICAICT107A Use personal productivity tools Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Release: 1. ICASAS206A Detect and protect from spam and destructive software
Release: 1 ICASAS206A Detect and protect from spam and destructive software ICASAS206A Detect and protect from spam and destructive software Modification History Release Release 1 Comments This Unit first
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
ICASAS301A Run standard diagnostic tests
ICASAS301A Run standard diagnostic tests Release: 1 ICASAS301A Run standard diagnostic tests Modification History Version ICASAS301A Comments This version first released with ICA11 Information and Communications
ICANWK504A Design and implement an integrated server solution
ICANWK504A Design and implement an integrated server solution Release: 1 ICANWK504A Design and implement an integrated server solution Modification History Release Release 1 Comments This Unit first released
Release: 1. CPPSEC4015A Maintain networked security system
Release: 1 CPPSEC4015A Maintain networked security system CPPSEC4015A Maintain networked security system Modification History Not Applicable Unit Descriptor Unit descriptor This unit of competency specifies
ICTTEN4215A Install and configure internet protocol TV in a service provider network
ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History
ICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
ICADBS504A Integrate database with a website
ICADBS504A Integrate database with a website Release: 1 ICADBS504A Integrate database with a website Modification History Release Release 1 Comments This Unit first released with ICA11 Information and
ICAB5071B Review developed software
ICAB5071B Review developed software Release: 1 ICAB5071B Review developed software Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines the competency required when applying
ICANWK414A Create a common gateway interface script
ICANWK414A Create a common gateway interface script Release: 1 ICANWK414A Create a common gateway interface script Modification History Release Release 1 Comments This Unit first released with ICA11 Information
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
ICAI4099A Build an intranet
ICAI4099A Unit Descriptor Unit Sector Build an intranet This unit defines the competency required to design, build and implement an intranet for a client. It does not however cover aspects relating to
ICTNPL5071A Develop planning strategies for core network design
ICTNPL5071A Develop planning strategies for core network design Release: 1 ICTNPL5071A Develop planning strategies for core network design Modification History Not Applicable Approved Page 2 of 15 Unit
Release: 1. ICAWEB414A Design simple web page layouts
Release: 1 ICAWEB414A Design simple web page layouts ICAWEB414A Design simple web page layouts Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications
ICAICT704A Direct ICT in a supply chain
ICAICT704A Direct ICT in a supply chain Release: 1 ICAICT704A Direct ICT in a supply chain Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
ICTSUS4183A Install and test renewable energy system for ICT networks
ICTSUS4183A Install and test renewable energy system for ICT networks Release: 1 ICTSUS4183A Install and test renewable energy system for ICT networks Modification History Not Applicable Unit Descriptor
Release: 1. ICAPMG601A Establish IT project governance
Release: 1 ICAPMG601A Establish IT project governance ICAPMG601A Establish IT project governance Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
ICTTEN8194A Investigate the application of cloud networks in telecommunications switching
ICTTEN8194A Investigate the application of cloud networks in telecommunications switching Release: 1 ICTTEN8194A Investigate the application of cloud networks in telecommunications switching Modification
ICAPRG529A Apply testing techniques for software development
ICAPRG529A Apply testing techniques for software development Release: 1 ICAPRG529A Apply testing techniques for software development Modification History Release Release 1 Comments This Unit first released
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
ICAWEB502A Create dynamic web pages
ICAWEB502A Create dynamic web pages Release: 1 ICAWEB502A Create dynamic web pages Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications Technology
ICAWEB507A Customise a complex IT content management system
ICAWEB507A Customise a complex IT content management system Release: 1 ICAWEB507A Customise a complex IT content management system Modification History Release Release 1 Comments This Unit first released
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
Release: 1. ICAICT404A Use online learning tools
Release: 1 ICAICT404A Use online learning tools ICAICT404A Use online learning tools Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications Technology
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
BSBINM501A Manage an information or knowledge management system
BSBINM501A Manage an information or knowledge management system Release: 1 BSBINM501A Manage an information or knowledge management system Modification History Not applicable. Unit Descriptor Unit descriptor
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
ICAWEB410A Apply web authoring tool to convert client data for websites
ICAWEB410A Apply web authoring tool to convert client data for websites Release: 1 ICAWEB410A Apply web authoring tool to convert client data for websites Modification History Release Release 1 Comments
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
Release: 1. ICTNWK607 Design and implement wireless network security
Release: 1 ICTNWK607 Design and implement wireless network security ICTNWK607 Design and implement wireless network security Modification History Release Release 1 Comments This version first released
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Release: 1. FNSILF302A Process a life insurance application
Release: 1 FNSILF302A Process a life insurance application FNSILF302A Process a life insurance application Modification History Release Release 1 Comments This Unit of Competency first released with FNS10
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
ICAS4134C Provide first-level remote help desk support
ICAS4134C Provide first-level remote help desk support Release: 1 ICAS4134C Provide first-level remote help desk support Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines
How To Protect Information At De Montfort University
Network Security Policy De Montfort University January 2006 Page 1 of 18 Contents 1 INTRODUCTION 1.1 Background... 1.2 Purpose and Scope... 1.3 Validity... 1.4 Assumptions... 1.5 Definitions... 1.6 References..
Release: 1. ICAICT422A Participate in IT services
Release: 1 ICAICT422A Participate in IT services ICAICT422A Participate in IT services Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
A Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
Release: 1. ICTTEN5217A Plan a wireless mesh network
Release: 1 ICTTEN5217A Plan a wireless mesh ICTTEN5217A Plan a wireless mesh Modification History Not Applicable Approved Page 2 of 10 Unit Descriptor Unit descriptor This unit describes the performance
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
How To Manage A Store Security Unit
SIRXRSK003A Apply store security systems and procedures Revision Number: 2 SIRXRSK003A Apply store security systems and procedures Modification History The version details of this endorsed unit are in
Release: 1. ICAB5230B Maintain custom software
Release: 1 ICAB5230B Maintain custom software ICAB5230B Maintain custom software Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines the competency required to maintain
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
CompTIA Security+ (Exam SY0-410)
CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Release: 1. BSBCCO407A Administer customer contact technology
Release: 1 BSBCCO407A Administer customer contact technology BSBCCO407A Administer customer contact technology Modification History Release Release 1 Comments This version first released with BSB07 Business
Network Security Topologies. Chapter 11
Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network
Release: 1. ICTPMG4152A Manage the delivery of network infrastructure
Release: 1 ICTPMG4152A Manage the delivery of network infrastructure ICTPMG4152A Manage the delivery of network infrastructure Modification History Not Applicable Unit Descriptor Unit descriptor This unit
EA-ISP-012-Network Management Policy
Technology & Information Services EA-ISP-012-Network Management Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 01/04/2015 Document Security Level: PUBLIC Document Version: 1.00 Document Ref:
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control