Chapter 16: Advanced Security

Similar documents
Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Chapter 12: Advanced Operating Systems

5. Execute the attack and obtain unauthorized access to the system.

Best Practices Guide to Electronic Banking

Chapter 11: Networks

Web Cash Fraud Prevention Best Practices

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Computer to Network Connection

Chapter 15: Advanced Networks

Education Network Security

Chapter 15: Advanced Networks

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

Chapter 11: It s a Network. Introduction to Networking

Cisco IT Essentials v6 Standards Alignment

CompTIA A+ Certification ( ) Study Guide Table of Contents

Lab: Configure Wireless Security

CompTIA A+ Accelerated course for & exams

Introduction. Assessment Test. Part I

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Course Outline (version 2)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

ACN Premium Technical Support. 24/7/365 Remote Computer Support

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac.

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office

ECDL / ICDL IT Security. Syllabus Version 2.0

SUMMARY OF SERVICES PROVIDED

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Security Checklist Frequently Asked Questions

Data Protection Policy

Ready Theatre Systems RTS POS

Wireless Attacks and Countermeasures

ipassconnect for Symbian User s Guide

Troubleshooting End User Wireless Networks

Networking the printer

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Level 3 Principles of ICT Systems and Data Security ( / )

NEN The Education Network

Lab - View Wireless and Wired NIC Information

TestOut PC Pro - English 6.0.x COURSE OUTLINE. Modified

Supporting Networked Computers

716 West Ave Austin, TX USA

HP Deskjet 6800 series

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Wireless Setup Instructions

Welcome to Cogeco UltraFibre Internet. UltraFibre Internet User Guide

SECURE USE OF IT Syllabus Version 2.0

Ethical Hacking and Prevention

HikCentral V1.3 for Windows Hardening Guide

USER GUIDE. Wireless-G Broadband Router. Model No: WRT54G2 V1

The R25 Robot Series

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

ipass Open Mobile for Mac User Guide

E-companion. Quiz for IT-knowledge

IT SYSTEMS ADMINISTRATOR PROGRAM

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac.

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Lab Viewing Wireless and Wired NIC Information

How to Build a Culture of Security

Computer Visions Course Outline

Windows Client, Enterprise Desktop Support Technician

Wireless Setup Guide (for Windows XP, Windows Vista, Windows 7, Windows 8 and Mac OSx)

COPYRIGHTED MATERIAL. Index

Standard For IIUM Wireless Networking

Security Awareness. Presented by OSU Institute of Technology

HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department

Linksys SMART Wi-Fi Routers with Wireless-AC. User Guide

University of Alabama at Birmingham MINIMUM SECURITY FOR COMPUTING DEVICES RULE July 2017

IT Department. Basic WIFI Troubleshooting on ACC SSID. October 2017

High-Speed Internet. Connection Guide

CompTIA A+ Complete Study Guide (Exams / ). Text with CD- ROM for Windows and Macintosh

This publication is printed on fully recyclable paper Sep D100 UG.AW2.indd 1 19/9/08 09:55:22

Windows 7, Enterprise Desktop Support Technician

Computing at MIT: Basics

ipass Open Mobile 1.2 for Mac User Guide

Define information security Define security as process, not point product.

HikCentral V.1.1.x for Windows Hardening Guide

New York City College of Technology/CUNY Department of Computer Systems Technology. CST2400 Computer System Management and Support 4 hours 3 credits

Chapter 14: Advanced Troubleshooting

Chapter 5 Local Area Networks. Computer Concepts 2013

Get to know your Modem 1. Modem Technical Overview 3

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

Troubleshooting and Supporting Windows 7 in the Enterprise

Cyber security tips and self-assessment for business

How To Remove Personal Antivirus Security Pro Virus Windows 8

Introduction to Information Security Dr. Rick Jerz

Linksys EA-Series Routers

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

1. Which network design consideration would be more important to a large corporation than to a small business?

Chapter 12: Advanced Operating Systems

The Basic Setup Wizard could not automatically configure my Internet connection.

Configuring Windows 8 Course 20687A - Five days - Instructor-led - Hands-on

Course: Windows 7 Enterprise Desktop Support Technician Boot Camp (MCITPWIN7)

Level 3 Install, configure and integrate networked hardware and software ( )

free internet receiver Quick Start Guide

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines

Identity Theft Prevention Policy

Transcription:

: Advanced Security IT Essentials: PC Hardware and Software v4.0 1

Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including student worksheets student labs student activities Reflection/Activities for instructors to complete to prepare to teach Additional resources 2

Objectives 16.1 Outline security requirements based on customer needs 16.2 Select security components based on customer needs 16.3 Implement customer's security policy 16.4 Perform preventive maintenance on security 16.5 Troubleshoot security 3

Worksheets, Activities, Labs 16.1.1 Worksheet: Security Policy 16.2.2 Activity: Security Devices 16.2.3 Worksheet: Firewalls 16.3.2 Lab: Windows XP Firewall 16.5.3 Lab: Fix a Security Problem 16.5.3 Remote Technician: Fix a Security Problem 4

Outline Security Requirements A security policy includes a comprehensive statement about the level of security required and how this security will be achieved. Is the computer located at a home or a business? Is there full-time Internet access? Is the computer a laptop? 5

Outline a Security Policy A collection of rules, guidelines, and checklists: Define an acceptable computer usage statement. Identify the people permitted to use the computer equipment. Identify devices that are permitted to be installed on a network, as well as the conditions of the installation. Define the requirements necessary for data to remain confidential on a network. Determine a process for employees to acquire access to equipment and data. 6

Security Hardware Identify hardware and equipment that can be used to prevent theft, vandalism, and data loss. To restrict access to premises, you might use biometrics, fences, and/or door locks. To protect the network infrastructure, you might secure telecom rooms, setup detection for unauthorized use of wireless, and/or setup hardware firewalls. To protect individual computers, you might use cable locks, laptop docking station locks and/or lockable cases. To protect data, you might use lockable HD carriers and/or USP security dongles. 7

Security Applications Security applications protect the operating system and software application data. Software Firewall Intrusion Detection Systems (IDS) Application and OS Patches Anti-virus software and anti-malware software Compare the cost of data loss to the expense of security protection, and then determine what tradeoffs are acceptable. 8

Selecting Security Components Consider the following factors when deciding on security components: Advantages and disadvantages of a security component Overlapping features and functions Component setup and maintenance requirements Budget restrictions Real and perceived threats 9

Security Techniques Depending on the situation, more than one technique may be required. Use encrypted passwords to login to the network Monitor network activity through logging and auditing Set up data encryption over wireless Encryption methods include: Hash encoding uses an algorithm to track tampering Symmetric encryption uses a key to encode/decode data Asymmetric encryption uses one key to encode and another key to decode VPN creates a virtual secure tunnel 10

Access Control Devices Physical access control devices Lock Conduit Card key Video surveillance Guards Two-factor identification methods for access control Smart card Security key fob Biometric device 11

Firewall Types Hardware Firewall Software Firewall Free-standing and uses dedicated hardware Available as 3rd party software and cost varies Initial cost for hardware and software updates can be costly Included in Windows XP operating system Multiple computers can be protected Typically protects only the computer it is installed on Little impact on the computer performance Uses the CPU, potentially slowing the computer 12

Configure Security Settings Two primary security settings include: Setting levels of permissions on folders and files Use FAT or NTFS to configure folder sharing or folder-level permissions for users with network access Use file-level permissions with NTFS to configure access to files Securing wireless access points Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) MAC address filtering Unused wireless connections Service Set Identifier (SSID) Broadcasting Wireless antenna 13

Configure Firewalls A restrictive firewall policy (open only the required ports) A permissive firewall policy (open all ports except those explicitly denied) Configure a software firewall manually or to run automatically. Configure a hardware firewall by indicating what is filtered by port type, port number, source address, and/or destination address. 14

Protect Against Malware Run software scanning programs to detect and remove the malicious software. Anti-virus, anti-spyware, anti-adware, and phishing programs Phishing attacks trick the user into providing the personal information. A user s data can be sold and/or used fraudulently. 15

Operating System Updates Windows XP update options: Automatic: Automatically downloads and installs without user intervention. Only Download Updates: Download the updates automatically, but the user is required to install them. Notify Me: Notify the user that updates are available and gives the user the option to download and install. Turn off Automatic Updates: Prevents automatically checking for updates. Updates have to be discovered, downloaded and installed by the user. 16

User Account Maintenance Group employees by job requirements to give access to files by setting up group permissions. When an employee leaves an organization, access to the network should be terminated immediately. Guests can be given access through a Guest account. 17

Data Backups Description Full or Normal Backup Archives all selected files Incremental Backup Archives all selected files that have changed since last full or incremental backup. It marks files as having been backed up. Differential Backup Archives everything that has changed since last full backup. It does not mark files as having been backed up. Daily Backup Archives all selected files that have changed on the day of the backup Copy Backup Archives all selected files 18

Troubleshooting Process Step 1 Gather data from the customer Step 2 Verify the obvious issues Step 3 Try quick solutions first Step 4 Gather data from the computer Step 5 Evaluate the problem and implement the solution Step 6 Close with the customer 19

Level-one Technician Gathers Data Description of problem by the level-one helpdesk technician: Customer is unable to connect to the network using wireless connection. Customer cannot surf the Internet. Customer cannot access any resources on the network. Wireless does not seem to be working properly at the office. The customer has checked all settings. The helpdesk technician was unable to resolve the problem, so the work order is escalated to a level-two technician. 20

Open-Ended Questions Here are some open-ended questions that a level-two technician might ask to gather more information from the customer in this scenario: Which specific network resources are you trying to access with your wireless system? Are there any network resources that you can access by wireless? When were you last able to access the network using wireless at the office? How does your computer perform using wireless at other locations? 21

Level-two Technician Draws Conclusions Based on the information given by the customer to the open-ended questions, these conclusions can be determined: In the office, no resources can be accessed. When operating away from the office, no problems are experienced. The problems started just after a new wireless router was installed. 22

Closed-Ended Questions Here are some closed-ended questions that a level-two technician might ask to gather more information from the customer in this scenario: Is your network cable plugged in? When you plug in your network cable, does everything work correctly? From the answers to these questions, you determine that the customer is experiencing a wireless connection problem. Therefore, focus your efforts on a problem with wireless connectivity in the office. 23

Verify the Obvious Issues Examine the most obvious causes of a problem. Does the access point appear to be on? What lights on the access point are on or flashing? Does anyone else have this problem? Have you been able to connect to the Internet since the wireless router was upgraded? Does this problem occur only at your desk or at other areas of the office as well? Have you been able to connect through wireless at any other locations? 24

Conclusions from Checking the Obvious The network login and password are valid. The wireless card in the user's computer operates normally. The problem is not interference with the wireless signal. There is probably a wireless configuration issue. 25

Quick Solutions Check the wireless signal strength in various areas in the office. Try connecting using wireless connection with security settings turned off. Results of quick solutions: The wireless signal strength seems normal. Wireless connection works with security turned off. So the problem is probably a configuration issue. Check the configurations on the computer and on the access point. 26

Gather Data from the Computer Determine the MAC address of the computer: 1. Select Start > Run 2. Type cmd in the Run box. The Command Line interface should appear 3. Enter ipconfig /all at the command prompt. 4. Write down the MAC address of the wireless NIC and of the Ethernet NIC. No resolution to the problem has been found at this point. The problem is most likely to be found in the configuration of the wireless access point security settings. 27

Evaluate Problem & Implement Solution 1. What do you know now? Works using the Ethernet cable Works using wireless when the security is disabled Works using wireless at home No one else has the problem Doesn t work when connected to the office wireless access point 2. Determine possible solutions Might be incorrect wireless access point configuration settings 3. Implement the best solution The MAC address filter on the access point was incorrectly configured for this customer. Add the computer s MAC address to the wireless access point MAC address filter list. 28

Close with the Customer Discuss with customer the solution implemented. Have customer verify problem is solved. Provide all paperwork to customer. Document steps of solution. Document components used in repair. Document time spent to resolve the problem. 29

Common Problems and Solutions Problem Symptom A customer reports that a backup that was started the night before is still going. A visiting consultant using a guest account cannot access needed files. A user refuses your request to e-mail you their student ID number and password. Possible Solution Advise the customer to implement a different type of backup that saves time. Grant access to the files for the duration of the visit. When the consultant leaves, disable the account. Inform the user that there was no such request. Gather information and warn others against this phishing attack. A user can locate a file on the server but Change the user permissions on this file cannot download it. from read to read and execute. A user cannot connect to the network using a wireless router even after the proper security key has been installed. Verify that the user s MAC address is listed in the MAC address filter table. 30

Fix a Security Problem Now that you understand the troubleshooting process, it is time to apply your listening and diagnostic skills. Receive the work order Research the problem Take the customer through various steps to try and resolve the problem Document the problem and the resolution 31

Summary Advanced Security Security requirements for customers differ because of budget restraints, the type of equipment to secure, and the decision regarding hardware and software security. A security policy should be developed and used to determine the type of firewall to be installed. Hardware and software security tools are available to protect data on a network. Security policies should be followed by everyone in the organization. Preventive maintenance is an effective part of security. 32

Instructor Training Activities 33

Activities for Instructor Training 1. Take the Quiz provided in course content. 2. Collect examples from the recent news of people loosing government laptops or copying sensitive data in an un-encrypted form. Use these examples as discussion points in 16.1.1 Outline a local security policy. 3. Conduct Internet research to pre-screen online resources for students to use in completing the worksheet, 16.2.3 Firewalls. 4. Brainstorm a list of at least 4 security problems to use for students to practice their troubleshooting skills. 34

Instructor Training Discussion Share with the other instructors the list of online resources found that students might use in completing the research portions of the worksheet. Share with the other instructors the list of additional troubleshooting scenarios. Participate in a role-playing activity of one of the troubleshooting scenarios. Following the role-playing activity, discuss the different ways you might incorporate role-playing activities into your classroom. Share ideas of how to make the student successful in these activities. 35

Additional Resources Linksys: Learning Center http://www.linksys.com Home PC Firewall GuideTM http://www.firewallguide.com HowStuffWorks: It's Good to Know http://computer.howstuffworks.com/firewall.htm United States Computer Emergence Readiness Team: Cyber Security Tip http://www.us-cert.gov/cas/tips/st04-004.html Microsoft: Security at Home: Firewall FAQs http://www.microsoft.com/athome/security/protect/firewall.mspx ConsumerSearch: Firewalls Reviews, Best Firewalls http://www.consumersearch.com/www/software/firewalls/index.html Matousec: Comparison of Top Five Personal Firewalls http://www.matousec.com/projects/windows-personal-firewall-analysis/topfive-comparison.php Computer Shopper, PC PRO UK: Personal Firewalls http://www.pcpro.co.uk/shopper/labs/222/software-labs-personalfirewalls/introduction.html Information Week: Safety First: 5 Firewalls for Your Desktop PC http://www.informationweek.com/software/showarticle.jhtml?articleid=192 201247 36

Q and A 37

38