1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Security+ Certification: Chapter 1 - Trung tâm Athena

18 57 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 18
Dung lượng 179,51 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Chapter 1 - Overview. After studying this chapter you will be able to: Understand network security, understand security threat trends, understand the goals of network security, determine the factors involved in a secure network strategy, security certification.

Trang 1

Security + Certification

Trang 2

About The Certification

 Security_Certification

• Has some Obsolete Links

• CC:Http://www.commoncriteria.org

• The International CC Project has discontinued the

Management Portal.

• NIST:http://www.csrc.nist.gov/publications computer security resource Center.

• RFC:http://www.icann.rfceditor.org

 Security_Certification

• Has some Obsolete Links

• CC:Http://www.commoncriteria.org

• The International CC Project has discontinued the

Management Portal.

• NIST:http://www.csrc.nist.gov/publications computer security resource Center.

• RFC:http://www.icann.rfceditor.org

Trang 3

The Security+ Certification Program

 The Security+ Certification is a testing program sponsored by the Computing Technology

Industry Association(CompTIA) that certifies the knowledge of the networking technicians who have accumulated 24 months of experience

in the information technology(IT) industry

 Http://www.comptia.org/certification

 The Security+ Certification is a testing program sponsored by the Computing Technology

Industry Association(CompTIA) that certifies the knowledge of the networking technicians who have accumulated 24 months of experience

in the information technology(IT) industry

 Http://www.comptia.org/certification

Trang 4

Course Introduction

 Chapter 1- Overview

 Chapter 2- Authentication

 Chapter 3- Attacks

 Chapter 4- Remote Access

 Chapter 5- Wireless

 Chapter 6- Email and Web Security

 Chapter 7- Devices and Media

 Chapter 8- Network Topology and IDS

 Chapter 9- System Hardening

 Chapter 1- Overview

 Chapter 2- Authentication

 Chapter 3- Attacks

 Chapter 4- Remote Access

 Chapter 5- Wireless

 Chapter 6- Email and Web Security

 Chapter 7- Devices and Media

 Chapter 8- Network Topology and IDS

 Chapter 9- System Hardening

Trang 5

Course Introduction

 Chapter 10- Basic of Security

 Chapter 11- Public key infrastructure

 Chapter 12 - Incident Response

 Chapter 13 - Policies and Disaster Recovery

 Chapter 10- Basic of Security

 Chapter 11- Public key infrastructure

 Chapter 12 - Incident Response

 Chapter 13 - Policies and Disaster Recovery

Trang 6

Learning Objectives

 Understand network security

 Understand security threat trends

 Understand the goals of network security

 Determine the factors involved in a secure network strategy

 Security Certification

 Understand network security

 Understand security threat trends

 Understand the goals of network security

 Determine the factors involved in a secure network strategy

 Security Certification

Trang 7

Information Security

Trang 8

Information Security

“Information Security is a

PROCESS , not TOOLS”

“Information Security is a

PROCESS , not TOOLS”

Trang 9

Understanding Network Security

 Network security (Information Security)

• Tasks of guarding digital information, which is typically processed by a computer (such as a personal computer), stored on a magnetic or optical storage device (such as a hard drive or DVD), and transmitted over a network spacing

• Process by which digital information assets are protected

 Network security (Information Security)

• Tasks of guarding digital information, which is typically processed by a computer (such as a personal computer), stored on a magnetic or optical storage device (such as a hard drive or DVD), and transmitted over a network spacing

• Process by which digital information assets are protected

Trang 10

Understanding Network Security

 Security ensures that users:

• Perform only tasks they are authorized to do

• Obtain only information they are authorized to have

• Cannot cause damage to data, applications, or operating environment

 Security ensures that users:

• Perform only tasks they are authorized to do

• Obtain only information they are authorized to have

• Cannot cause damage to data, applications, or operating environment

Trang 11

Security threat trends

 A vulnerability is a weakness in a system, such

as mis-configured hardware or software, poor design, user carelessness, etc

 A threat is an unauthorized access to a network

Trang 12

Security Terminology

Trang 13

Goals of Information Security

 Confidentiality

• Protection of data from unauthorized disclosure to a third party

 Integrity

• Assurance that data is not altered or destroyed in an unauthorized manner

 Availability

• Continuous operation of computing systems

 Confidentiality

• Protection of data from unauthorized disclosure to a third party

 Integrity

• Assurance that data is not altered or destroyed in an unauthorized manner

 Availability

• Continuous operation of computing systems

Trang 14

Causes of network security vulnerabilities

 Technology weaknesses

 Configuration weaknesses

 Policy weaknesses

 Human error

 Technology weaknesses

 Configuration weaknesses

 Policy weaknesses

 Human error

Trang 15

Creating a Secure Network Strategy

 Human factors

 Know your weaknesses

 Limit access to resources – use “Principle of Least Privilege”

 Remember physical security

 Use the concept of “Defense in Depth”

 Human factors

 Know your weaknesses

 Limit access to resources – use “Principle of Least Privilege”

 Remember physical security

 Use the concept of “Defense in Depth”

Trang 16

Creating a Secure Network Strategy

 Firewalls

 Web and file servers – harden and test

configuration of mission-critical machines

 Access control

 Change management

 Encryption

 Intrusion detection system (IDS)

 Firewalls

 Web and file servers – harden and test

configuration of mission-critical machines

 Access control

 Change management

 Encryption

 Intrusion detection system (IDS)

Trang 17

Security Certification

• 1 exam (225 USD)

• General information

• 4 exams (2*150 USD, 2*180 USD)

• Distributing and detail information

• exams (499 USD)

• Securing Cisco IOS® Networks

• Cisco Secure PIX Firewall Advanced

• Cisco Secure Intrusion Detection System

• 1 exam (225 USD)

• General information

• 4 exams (2*150 USD, 2*180 USD)

• Distributing and detail information

• exams (499 USD)

• Securing Cisco IOS® Networks

• Cisco Secure PIX Firewall Advanced

• Cisco Secure Intrusion Detection System

Trang 18

 Understanding network security

 Security threats

 Goals of network security

 Creating a secure network strategy

 Security Certification

 Understanding network security

 Security threats

 Goals of network security

 Creating a secure network strategy

 Security Certification

Ngày đăng: 30/01/2020, 10:30