Chapter 1 - Overview. After studying this chapter you will be able to: Understand network security, understand security threat trends, understand the goals of network security, determine the factors involved in a secure network strategy, security certification.
Trang 1Security + Certification
Trang 2About The Certification
Security_Certification
• Has some Obsolete Links
• CC:Http://www.commoncriteria.org
• The International CC Project has discontinued the
Management Portal.
• NIST:http://www.csrc.nist.gov/publications computer security resource Center.
• RFC:http://www.icann.rfceditor.org
Security_Certification
• Has some Obsolete Links
• CC:Http://www.commoncriteria.org
• The International CC Project has discontinued the
Management Portal.
• NIST:http://www.csrc.nist.gov/publications computer security resource Center.
• RFC:http://www.icann.rfceditor.org
Trang 3The Security+ Certification Program
The Security+ Certification is a testing program sponsored by the Computing Technology
Industry Association(CompTIA) that certifies the knowledge of the networking technicians who have accumulated 24 months of experience
in the information technology(IT) industry
Http://www.comptia.org/certification
The Security+ Certification is a testing program sponsored by the Computing Technology
Industry Association(CompTIA) that certifies the knowledge of the networking technicians who have accumulated 24 months of experience
in the information technology(IT) industry
Http://www.comptia.org/certification
Trang 4Course Introduction
Chapter 1- Overview
Chapter 2- Authentication
Chapter 3- Attacks
Chapter 4- Remote Access
Chapter 5- Wireless
Chapter 6- Email and Web Security
Chapter 7- Devices and Media
Chapter 8- Network Topology and IDS
Chapter 9- System Hardening
Chapter 1- Overview
Chapter 2- Authentication
Chapter 3- Attacks
Chapter 4- Remote Access
Chapter 5- Wireless
Chapter 6- Email and Web Security
Chapter 7- Devices and Media
Chapter 8- Network Topology and IDS
Chapter 9- System Hardening
Trang 5Course Introduction
Chapter 10- Basic of Security
Chapter 11- Public key infrastructure
Chapter 12 - Incident Response
Chapter 13 - Policies and Disaster Recovery
Chapter 10- Basic of Security
Chapter 11- Public key infrastructure
Chapter 12 - Incident Response
Chapter 13 - Policies and Disaster Recovery
Trang 6Learning Objectives
Understand network security
Understand security threat trends
Understand the goals of network security
Determine the factors involved in a secure network strategy
Security Certification
Understand network security
Understand security threat trends
Understand the goals of network security
Determine the factors involved in a secure network strategy
Security Certification
Trang 7Information Security
Trang 8Information Security
“Information Security is a
PROCESS , not TOOLS”
“Information Security is a
PROCESS , not TOOLS”
Trang 9Understanding Network Security
Network security (Information Security)
• Tasks of guarding digital information, which is typically processed by a computer (such as a personal computer), stored on a magnetic or optical storage device (such as a hard drive or DVD), and transmitted over a network spacing
• Process by which digital information assets are protected
Network security (Information Security)
• Tasks of guarding digital information, which is typically processed by a computer (such as a personal computer), stored on a magnetic or optical storage device (such as a hard drive or DVD), and transmitted over a network spacing
• Process by which digital information assets are protected
Trang 10Understanding Network Security
Security ensures that users:
• Perform only tasks they are authorized to do
• Obtain only information they are authorized to have
• Cannot cause damage to data, applications, or operating environment
Security ensures that users:
• Perform only tasks they are authorized to do
• Obtain only information they are authorized to have
• Cannot cause damage to data, applications, or operating environment
Trang 11Security threat trends
A vulnerability is a weakness in a system, such
as mis-configured hardware or software, poor design, user carelessness, etc
A threat is an unauthorized access to a network
Trang 12Security Terminology
Trang 13Goals of Information Security
Confidentiality
• Protection of data from unauthorized disclosure to a third party
Integrity
• Assurance that data is not altered or destroyed in an unauthorized manner
Availability
• Continuous operation of computing systems
Confidentiality
• Protection of data from unauthorized disclosure to a third party
Integrity
• Assurance that data is not altered or destroyed in an unauthorized manner
Availability
• Continuous operation of computing systems
Trang 14Causes of network security vulnerabilities
Technology weaknesses
Configuration weaknesses
Policy weaknesses
Human error
Technology weaknesses
Configuration weaknesses
Policy weaknesses
Human error
Trang 15Creating a Secure Network Strategy
Human factors
Know your weaknesses
Limit access to resources – use “Principle of Least Privilege”
Remember physical security
Use the concept of “Defense in Depth”
Human factors
Know your weaknesses
Limit access to resources – use “Principle of Least Privilege”
Remember physical security
Use the concept of “Defense in Depth”
Trang 16Creating a Secure Network Strategy
Firewalls
Web and file servers – harden and test
configuration of mission-critical machines
Access control
Change management
Encryption
Intrusion detection system (IDS)
Firewalls
Web and file servers – harden and test
configuration of mission-critical machines
Access control
Change management
Encryption
Intrusion detection system (IDS)
Trang 17Security Certification
• 1 exam (225 USD)
• General information
• 4 exams (2*150 USD, 2*180 USD)
• Distributing and detail information
• exams (499 USD)
• Securing Cisco IOS® Networks
• Cisco Secure PIX Firewall Advanced
• Cisco Secure Intrusion Detection System
• 1 exam (225 USD)
• General information
• 4 exams (2*150 USD, 2*180 USD)
• Distributing and detail information
• exams (499 USD)
• Securing Cisco IOS® Networks
• Cisco Secure PIX Firewall Advanced
• Cisco Secure Intrusion Detection System
Trang 18 Understanding network security
Security threats
Goals of network security
Creating a secure network strategy
Security Certification
Understanding network security
Security threats
Goals of network security
Creating a secure network strategy
Security Certification