Home
Chapter 10: Security
10.0 Security
10.0.1 Introduction
10.0.1.1 Introduction
10.1 Security Threats
10.1.1 Types of Security Threats
10.1.1.1 Adware, Spyware, and Phishing
10.1.1.2 Viruses, Worms, Trojans, and Rootkits
10.1.1.3 Web Security
10.1.1.4 InPrivate Browsing
10.1.1.5 Spam
10.1.1.6 TCP/IP Attacks
10.1.1.7 Worksheet - Security Attacks
10.1.2 Access to Data and Equipment
10.1.2.1 Social Engineering
10.1.2.2 Data Wiping, Hard Drive Destruction, and Recycling
10.2 Security Procedures
10.2.1 Security Policies
10.2.1.1 What Is a Security Policy?
10.2.1.2 Worksheet - Answer Security Policy Questions
10.2.1.3 Security Policy Requirements
10.2.1.4 Usernames and Passwords
10.2.1.5 Password Requirements
10.2.1.6 File and Folder Permissions
10.2.1.7 Lab - Securing Accounts, Data, and the Computer in Windows 7
10.2.1.8 Lab - Securing Accounts, Data, and the Computer in Windows Vista
10.2.1.9 Lab - Securing Accounts, Data, and the Computer in Windows XP
10.2.2 Protecting Data
10.2.2.1 Software Firewalls
10.2.2.2 Biometrics and Smart Cards
10.2.2.3 Data Backups
10.2.2.4 Data Encryption
10.2.3 Protection Against Malicious Software
10.2.3.1 Malicious Software Protection Programs
10.2.3.2 Worksheet - Third-Party Antivirus Software
10.2.3.3 Signature File Updates
10.2.4 Security Techniques
10.2.4.1 Common Communication Encryption Types
10.2.4.2 Service Set Identifiers
10.2.4.3 MAC Address Filtering
10.2.4.4 Wireless Security Modes
10.2.4.5 PT - Wireless Security Techniques
10.2.4.6 Wireless Access
10.2.4.7 Firewalls
10.2.4.8 Worksheet - Research Firewalls
10.2.4.9 Port Forwarding and Port Triggering
10.2.4.10 Lab - Configure Wireless Security
10.2.5 Protecting Physical Equipment
10.2.5.1 Physical Equipment Protection Methods
10.2.5.2 Security Hardware
10.2.5.3 Physical Security Activity
10.3 Common Preventive Maintenance Techniques for Security
10.3.1 Security Maintenance
10.3.1.1 Operating System Service Packs and Security Patches
10.3.1.2 Worksheet - Operating System Updates in Windows
10.3.1.3 Data Backups
10.3.1.4 Lab - Data Backup and Recovery in Windows 7
10.3.1.5 Lab - Data Backup and Recovery in Windows Vista
10.3.1.6 Lab - Data Backup and Recovery in Windows XP
10.3.1.7 Configuring Firewall Types
10.3.1.8 Lab - Configure a Windows 7 Firewall
10.3.1.9 Lab - Configure a Windows Vista Firewall
10.3.1.10 Lab - Configure a Windows XP Firewall
10.3.1.11 Maintaining Accounts
10.4 Basic Troubleshooting Process for Security
10.4.1 Applying the Troubleshooting Process to Security
10.4.1.1 Identify the Problem
10.4.1.2 Establish a Theory of Probable Cause
10.4.1.3 Test the Theory to Determine Cause
10.4.1.4 Establish a Plan of Action to Resolve the Problem and Implement the Solution
10.4.1.5 Verify Full System Functionality and, If Applicable Implement Preventive Measures
10.4.1.6 Document Findings, Actions and Outcomes
10.4.2 Common Problems and Solutions for Security
10.4.2.1 Identify Common Problems and Solutions
10.4.2.2 Worksheet - Gather Information from the Customer
10.5 Security
10.5.1 Summary
10.5.1.1 Summary
Expand All
Collapse All
Previous
Next
Toggle
Please log into
netacad.com
before accessing this course.