Chapter 15: Computer and Network Security



Similar documents
Section 12 MUST BE COMPLETED BY: 4/22

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Practice test Domain-2 Security (Brought to you by RMRoberts.com)

Security. TestOut Modules

Payment Card Industry Self-Assessment Questionnaire

Detailed Description about course module wise:

Medical Networks and Operating Systems

Best Practices Guide to Electronic Banking

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Chapter 4 Application, Data and Host Security

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Certified Secure Computer User

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Certified Secure Computer User

Developing Network Security Strategies

CompTIA Network+ (Exam N10-005)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Computer Security: Best Practices for Home Computing. Presented by Student Help Desk Merced Community College

Data Stored on a Windows Server Connected to a Network

Locking down a Hitachi ID Suite server

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

9 Simple steps to secure your Wi-Fi Network.

CompTIA Security+ (Exam SY0-410)

Why is a strong password important?

Microsoft MTA Qualifications. CompTIA Qualifications. Course Title: SUPPORT SPECIALIST (ITSS) Includes Work Experience of 16 weeks with IT company

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Remote Deposit Terms of Use and Procedures

form approved June/2006 revised Page 1 of 7

How To Secure An Rsa Authentication Agent

Eleventh Hour Security+

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Why you need. McAfee. Multi Acess PARTNER SERVICES

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Windows Operating Systems. Basic Security

Guideline on Auditing and Log Management

Attacks from the Inside

Catapult PCI Compliance

FileCloud Security FAQ

Data Stored on a Windows Computer Connected to a Network

IT Networking and Security

Advanced Administration

Telework and Remote Access Security Standard

Security Awareness. Wireless Network Security

CYBERTRON NETWORK SOLUTIONS

PCI implementation guide for L-POS

Network and Security Controls

Securing your Linksys WRT54G

Did you know your security solution can help with PCI compliance too?

SonicWALL PCI 1.1 Implementation Guide

13 Ways Through A Firewall

Movie Cube. User s Guide to Wireless Function

Secure Your Mobile Workplace

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security: A Practical Approach. Jan L. Harrington

Critical Controls for Cyber Security.

Industrial Security for Process Automation

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

General Information. About This Document. MD RES PCI Data Standard November 14, 2007 Page 1 of 19

CONNECTING THE RASPBERRY PI TO A NETWORK

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Research Information Security Guideline

Security Management. Keeping the IT Security Administrator Busy

Web Security School Final Exam

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Release Notes for Websense Security v7.2

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Functionality Added in M-480 Ver. 1.6

Nessus Agents. October 2015

Best Practices for Outdoor Wireless Security

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Data Access Request Service

How To Manage Your Information Systems At Aerosoft.Com

How To Manage A Network Safely

Sitefinity Security and Best Practices

CEH Version8 Course Outline

Global Partner Management Notice

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Introduction. PCI DSS Overview

Networking: EC Council Network Security Administrator NSA

HomeNet. Gateway User Guide

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Configuration Information

Kaspersky Lab Mobile Device Management Deployment Guide

Managed Antivirus Quick Start Guide

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Transcription:

Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e

What is in a security policy Mobile device security methods and devices To perform operating system and data protection How to optimize security for Windows To configure wireless security options Common techniques used when dealing with irate customers

801-1.1: Configure and apply BIOS settings. 801-2.5: Compare and contrast wireless networking standards and encryption types. 801-2.6: Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. 801-2.9: Compare and contrast network devices, their functions, and features. 801-3.3: Compare and contrast laptop features. 801-5.3: Given a scenario, demonstrate proper communication and professionalism. 801-5.4: Explain the fundamentals of dealing with prohibited content/activity. 802-1.1: Compare and contrast the features and requirements of various Microsoft operating systems. 802-1.4: Given a scenario, use appropriate operating system features and tools.

802-1.5: Given a scenario, use Control Panel utilities. 802-1.6: Set up and configure Windows networking on a client/desktop. 802-1.8: Explain the differences among basic OS security settings. 802-1.9: Explain the basics of client-side virtualization. 802-2.1: Apply and use common prevention methods. 802-2.2: Compare and contrast common security threats. 802-2.3: Implement security best practices to secure a workstation. 802-2.4: Given a scenario, use the appropriate data destruction/disposal method. 802-2.5: Given a scenario, secure a SOHO wireless network. 802-2.6: Given a scenario, secure a SOHO wired network. 802-3.3: Compare and contrast methods for securing mobile devices. 802-4.7: Given a scenario, troubleshoot common security issues with appropriate tools and best practices.

Physical Access Antivirus Acceptable Use Password Email Usage Remote Access Emergency Procedures

Smart Card Key Fob RFID (Radio Frequency ID) RSA (Rivest Shamir Adleman) Security Token TPM (Trusted Platform Module) Computer Cage Tracking Module Privacy Filter Mantrap

File Systems and Security Patches, Updates, and Service Packs Antivirus Encryption BitLocker DEP (Data Execution Prevention) Passwords Auditing Permissions

Encryption Rootkit Hijacking Spam Cookie Proxy Server Firewall Antivirus and Antispyware Social Engineering Phishing

Access ARP (Address Resolution Protocol) Spoofing Backdoor Brute Force DoS (Denial of Service) DDoS (Distributed Denial of Service) Reconnaissance Replay Smurf TCP/IP Hijacking Vulnerability Scanner

Virus Spyware or Grayware Phishing Child Exploitation Software Piracy

Open Authentication Shared Key Authentication WEP (Wired Equivalent Privacy) WPA (Wi-Fi Protected Access) WPA2

Trust begins with professionalism in your attire, attitude, written communication, and oral communication. Be honest with the customer. Do not use or discuss any material you see while in a customer area. Do not touch or move things or papers in a customer area. Do what you say you will do. Every time you step into a customer area or talk to a customer, it might lead to a professional reference, a job recommendation, a job lead, or a promotion. Be professional in all that you do.

This chapter has information relating to both the 801 and 802 exams and is the most complex chapter because so many security issues need to be experienced in order to know exactly what things to try. As a starting point, be very familiar with the Internet Explorer Internet Options tabs. Review them right before the 802 exam. Be very familiar with wireless security techniques: default usernames, SSID, encryption, SSID broadcasting, MAC filtering, radio power levels, and static IP addressing. Know what to do if you happen across prohibited content/data. Review what to do with security problems such as computer slowdowns, lockups, pop-ups, viruses, malware, and spam. Know the symptoms of a virus and malware. For mobile devices, be able to compare and contrast passcode locks, remote wipes, remote backup applications, failed login attempts restrictions, locator apps, antivirus, and patching/os updates.

A security policy guides a company in security matters. The policy defines such things as physical access, antivirus, acceptable usage of devices and data, password policies, email usage guidelines, remote access strategies, and emergency procedures. Physical security can include door access, key control, authentication methods including the use of smart cards, key fobs, RFID, biometric devices, physical protection of network devices such as servers, APs, switches, and routers, as well as privacy filters. BIOS security options include configuring a supervisor/user password, disabling unused ports, disabling USB ports, and disabling device options. To protect the operating system, use NTFS, and have a plan for updating the operating system, web browser, antivirus, antimalware, and antispyware. Encrypt files and folders as necessary. Use BitLocker and TPM technologies, implement a firewall, and disable AutoRun. If a computer with sensitive data on the hard drive is to be donated, moved, or sold, perform the following: (1) secure erasing, (2) degaussing, and (3) drilling through drive platters and then destroying the pieces with a hammer.

If virtualization is used, ensure that each virtual machine has adequate protection (firewall, antivirus, antimalware, and antispyware). Some virus or malware files are quarantined and must be manually deleted. The Windows guest account should be disabled; the administrator account should be renamed and have a strong password. User accounts provide the amount of administration dictated by what the person needs (principle of least privilege). Permissions should be assigned appropriately to remotely accessed files and folders. Use either share permissions or NTFS permissions (for more control), but not both on the same network share. If a file is placed in a folder that has permissions, the file inherits the folder permissions. Effective permissions are the bottom-line permissions someone has when group permissions and individual permissions have been granted. A hijacked browser can cause a different home page to appear, a particular web page to be displayed, a rootkit or other malware to be installed, different DNS settings to be applied, or a new or updated HOSTS file applied. Email applications now protect against spam, but you can also create rules to block messages from a particular source or subject line.

Cookies store typed information including sign-ons, sites visited, passwords, and data entered through the web browser. Internet Explorer can be customized to various levels of alerts and protection. When a security incident occurs, identify the issue, report it through the proper channels and to the appropriate authorities, and preserve the data by using a chain-of-custody form. On a wireless network, implement encryption and authentication. Change default SSIDs and passwords. Secure a mobile device with a PIN, facial recognition, a password, or a passcode/pattern. Secure important data using remote backups to the cloud. Remote data wiping can be configured if the device is compromised or stolen. When dealing with a customer, a co-worker, or your boss, maintain your professionalism and do everything you can to build trust.