Security. TestOut Modules 12.6 12.10



Similar documents
Section 12 MUST BE COMPLETED BY: 4/22

CTS2134 Introduction to Networking. Module Network Security

Network Configuration Settings

9 Simple steps to secure your Wi-Fi Network.

7.1. Remote Access Connection

Network Access Security. Lesson 10

Security IIS Service Lesson 6

Practice test Domain-2 Security (Brought to you by RMRoberts.com)

SonicWALL PCI 1.1 Implementation Guide

Please note that in VISA s vernacular this security program for merchants is sometimes called CISP (cardholder information security program).

The next generation of knowledge and expertise Wireless Security Basics

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

University of Hawaii at Manoa Professor: Kazuo Sugihara

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

A Guide to New Features in Propalms OneGate 4.0

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Cisco QuickVPN Installation Tips for Windows Operating Systems

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Exam Questions SY0-401

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

Security Awareness. Wireless Network Security

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

Connecting to and Setting Up a Network

Wireless Network Configuration Guide

Chapter 15: Computer and Network Security

Setting Up Scan to SMB on TaskALFA series MFP s.

Filtering remote users with Websense remote filtering software v7.6

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Catapult PCI Compliance

GlobalSCAPE DMZ Gateway, v1. User Guide

Configuring Windows Server 2008 Network Infrastructure

Windows Remote Access

Configure WorkGroup Bridge on the WAP131 Access Point

Internet Privacy Options

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Domain 3.0 Networking... 1

ICT Professional Optional Programmes

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Configuring the WT-4 for ftp (Infrastructure Mode)

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

On-Site Computer Solutions values these technologies as part of an overall security plan:

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Chapter 1 Network Security

Course 20688A: Managing and Maintaining Windows 8

MN-700 Base Station Configuration Guide

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Access Your Cisco Smart Storage Remotely Via WebDAV

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

Cisco Virtual Office Express

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

NETWORK SECURITY (W/LAB) Course Syllabus

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Gigabit SSL VPN Security Router

Wireless Cable Gateway CG3100Dv3

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?

Implementing and Supporting Microsoft Windows XP Professional

2.4GHz / 5GHz Dual CPU 600Mbps 11N AP/Router

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

User Guide. E-Series Routers

ENHWI-N n Wireless Router

ESR7550 KEY FEATURES PRODUCT DESCRIPTION

Advanced Configuration Guide. Vodafone Mobile Broadband Hotspot Vodafone MiFi 2352

Solution of Exercise Sheet 5

MS Configuring Windows 8.1


Frequently Asked Questions

Purple Sturgeon Standard VPN Installation Manual for Windows XP

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010

Course 6292A: Installing and Configuring Windows 7 Client. About this Course. Audience Profile

Chapter 3 Safeguarding Your Network

Chapter 4 Customizing Your Network Settings

What is the Barracuda SSL VPN Server Agent?

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

A+ Correlation Chart. CompTIA A Domain 1.0 Hardware. Text Lab Study Guide

Eduroam wireless network Windows Vista

Kerio Control. Step-by-Step Guide. Kerio Technologies

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Security Technology: Firewalls and VPNs

CONNECTING THE RASPBERRY PI TO A NETWORK

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

70-685: Enterprise Desktop Support Technician

Using a VPN with Niagara Systems. v0.3 6, July 2013

SECURE FTP CONFIGURATION SETUP GUIDE

Configuring Security Solutions

How to connect to the diamonds wireless network with Vista.

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

LW310V2 Sweex Wireless 300N Router

Basic Exchange Setup Guide

WIRELESS SETUP FOR WINDOWS 7

Step-by-Step Configuration

Chapter 2 Editor s Note:

Transcription:

Security TestOut Modules 12.6 12.10

Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card Biometric Many authentication systems also use cognitive information about you to help prove your identity.

Stronger authentication Stronger authentication processes require the user to provide multiple authentication factors. There are three general categories of authentication factors: 1. Something the user knows: username, password, or PIN number. 2. Something the user has: smart card. 3. Something the user is: fingerprint or a retina scan. True multifactor authentication requires the user to provide an authentication factor from more than one category

Password Policy A password policy is a system configuration that prevents users from choosing easy passwords. Requires passwords 8 characters or longer. Prevents the use of the username or a dictionary word in the password. Requires the use of numbers and symbols in addition to letters. Forces periodic password changes and prevents the reuse of recent passwords. In Windows, edit the Local Security Policy to modify password settings for a local computer, or the Default Domain Policy to control passwords for all computers in an Active Directory domain.

Authentication Management Usernames are not case sensitive. Passwords are case sensitive. A disabled account cannot be used for logon. To access a shared folder or use Remote Desktop for a workgroup computer, you must supply a username and password that matches a user account configured on the computer you are trying to access. User accounts with blank passwords cannot be used to gain network access to a computer (configure a password first, logon, then to reconnect). By default, members of the Administrators group are allowed Remote Desktop access. To allow non-administrators access, add them to the Remote Desktop Users group.

Encryption File EFS (Encrypting File Service) Encrypts individual files or folders on NTFS partitions. You can add other users who can also open the encrypted file. Files remain encrypted even if the drive is moved to another computer or another operating system. Encryption cannot be used together with compression (you can use either, but not both). Disk BitLocker provides whole disk encryption with Microsoft Vista or Windows 7 Ultimate or Enterprise. Data Transmission A Virtual Private Network (VPN) uses IPSec, PPTP, and L2TP encryption to establish a secure communication channel between two hosts, or between one site and another site. Secure Sockets Layer (SSL) is a protocol that can be added to other protocols to provide security and encryption. For example, HTTPS uses SSL to secure Web transactions. Use WPA, WPA2, or WEP to secure wireless communications. When implementing network services, do not use protocols such as FTP or Telnet that pass logon credentials and data in clear text. Instead, use a secure alternative such as FTP-S or SSH.

Wired Network Security Physical security Unnecessary software User accounts Usernames and passwords MAC address filtering Static IP addressing Disabling ports

Wireless Network Security Usernames and passwords SSID names SSID broadcast Encryption MAC address filtering Static IP addressing Data emanation

Firewalls A firewall is a device or software running on a device that inspects network traffic and allows or blocks traffic based on a set of rules. A network-based firewall A host-based firewall By default, the firewall allows all outgoing Web traffic and responses but blocks all incoming traffic. Configure exceptions to allow incoming traffic. In Windows Firewall, you can configure two exception types: Program Port

Firewalls Most SOHO routers and access points include a firewall to protect your private network. Configure port triggering to allow the firewall to dynamically open incoming ports based on outgoing traffic from a specific private IP address and port. Configure port forwarding to allow incoming traffic directed to a specific port to be allowed through the firewall and sent to a specific device on the private network.

Proxy Server A proxy server is a device that stands as an intermediary between a host and the Internet. A proxy server is a specific implementation of a firewall that uses filter rules to allow or deny Internet traffic. With a proxy, every packet is stopped and inspected at the firewall which causes a break between the client and the source server. Can control Internet access based on user account and time of day. Prevent users from accessing certain Web sites. For example, proxy servers used in schools or at home protect children from viewing inappropriate sites. Restrict users from using certain protocols. For example, a proxy server at work might prevent instant messaging, online games, or streaming media. Cache heavily accessed Web content to improve performance.