Preview

Chapter 3 notes

Good Essays
Open Document
Open Document
2990 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 3 notes
8/30/2012

Mike Meyers’ CompTIA Network+® Guide to Managing and
Troubleshooting Networks, Third Edition (Exam N10-005)

Mike Meyers’ CompTIA Network+® Guide to Managing and
Troubleshooting Networks, Third Edition (Exam N10-005)

Protecting Your Network

Objectives

Chapter 16

• Discuss the common security threats in network computing
• Describe the methods for securing user accounts • Explain how firewalls, NAT, port filtering, and packet filtering protect a network from threats

© 2012 The McGraw-Hill Companies, Inc. All rights reserved.

© 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Mike Meyers’ CompTIA Network+® Guide to Managing and
Troubleshooting Networks, Third Edition (Exam N10-005)

Mike Meyers’ CompTIA Network+® Guide to Managing and
Troubleshooting Networks, Third Edition (Exam N10-005)

Introduction to protecting your network Overview

• What are the threats to networks?
– Hackers, etc.
– Authorized users with good intentions
– Natural disasters
– A network threat is anything that can potentially damage network data, machines, or users

• Explore tools and methods for protection
© 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Mike Meyers’ CompTIA Network+® Guide to Managing and
Troubleshooting Networks, Third Edition (Exam N10-005)

© 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Mike Meyers’ CompTIA Network+® Guide to Managing and
Troubleshooting Networks, Third Edition (Exam N10-005)

Three parts to Chapter 16
• Common threats
• Securing user accounts
• Firewalls

© 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Common threats

© 2012 The McGraw-Hill Companies, Inc. All rights reserved.

1

8/30/2012

Mike Meyers’ CompTIA Network+® Guide to Managing and
Troubleshooting Networks, Third Edition (Exam N10-005)

• Summary of common threats
– System crashes/other hardware failures
– Administrative access-control weaknesses

You May Also Find These Documents Helpful

  • Good Essays

    Chapter 13 Notes

    • 3414 Words
    • 11 Pages

    From 1600 to 1750, trade continued to expand, tying all areas of the globe together. Demands for silver, sugar, spices, silks, cotton, and porcelain drove trade so that products from each major global region could be found virtually everywhere else. Silver allowed economies to become commercialized and began to strengthen the hand of European trade. Europeans began moving, and forcibly moving Africans, into new places while Europeans expanded their colonial reach. Competition led to bitter conflicts, challenging the preeminence of Afro-Eurasia’s great centralized empires.…

    • 3414 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    A P Chapter 6 Notes

    • 1931 Words
    • 8 Pages

    Elastic Cartilage: resemble hyaline cartilages, but they contain more stretchy elastic fibers and are better able to stand up to repeated bending.…

    • 1931 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    Defense in Depth provides the university several layers of protection. Starting at the endpoints, host intrusion protection (HIPS), should be installed on each Device. Properly installed, HIPS will not permit the installation of unauthorized programs. This was the root cause of the (D)DoS recently experienced. At the routers access control lists (ACLs) must be put in place to allow only traffic with a legitimate protocol and destination. Between the routers and the endpoint a firewall solution must be put in place. The firewall must be configured to allow only allowed protocols and port numbers to communicate with specific destinations. Between the firewall and endpoint a (D)DoS a detection tool (such as Arbor’s Prevail) must be put in place. This measure not only allows for quick detection of (D)DoS it also permits the automatic mitigation of the…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Chapter 2 Notes Apwh

    • 425 Words
    • 2 Pages

    Zhou- ended by a decline in political infrastructure, extended a territory of china by taking over the yangtze river valley. became knows as the middle kingdom…

    • 425 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Notes Week 2

    • 391 Words
    • 2 Pages

    c. Purpose: Solution to homelessness is needed; economic downturn, homeless families w/children, government and private sectors working together, previously submitted solutions were inhumane…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Notes Chapter 36

    • 2839 Words
    • 12 Pages

    During the 1920s and 1930s, after the Great War and during the Great Depression, intellectuals and political activists in Asia, Africa, and Latin America challenged the ideological and economic underpinnings of European imperialism and neo-colonialism, as nationalist and anti-imperialist movements gained strength on each of these continents.…

    • 2839 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Chapter 26 Notes

    • 699 Words
    • 3 Pages

    and in Venezuela their plantation agriculture had declined as well. The Ranching in Uruguay and…

    • 699 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 5 NOTES

    • 883 Words
    • 7 Pages

    5. Dialects reflect distinct features of the environment where groups live. Dialects are defined as “regional…

    • 883 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 4 Notes

    • 1517 Words
    • 7 Pages

    Ego: The part of the psyche that, according to psychoanalytic theory, governs rational behavior; the moderator between the id and the superego.…

    • 1517 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    Chapter 10, 11, and 6 Notes

    • 4053 Words
    • 17 Pages

    Public opinion: a mechanism that quantifies the various opinions held by the population or by subgroups of the population at a particular point in time…

    • 4053 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The following are four troubleshooting scenarios that represent typical networking problems. Read each one carefully. For each question or activity that follows, write a 150-word response. Place your responses into a Microsoft® Word document, including the title of each scenario.…

    • 843 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    chapter 3 and 4

    • 1040 Words
    • 4 Pages

    These questions are meant to serve as guide to help you pick out the most important information. Answer these questions to the best of your ability. Bulleted lists are acceptable as long as they consist of more than a few words. These concepts should be well thought out.…

    • 1040 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Chapter 3 Apush Notes

    • 1161 Words
    • 5 Pages

    How did John Calvin's teachings result in some Englishmen wanting to leave England? Some Puritans were motivated by Calvin to break off from England and the rest of their religious group to start brand new lives.…

    • 1161 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Ccna 1 Final Exam

    • 2829 Words
    • 12 Pages

    3 Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?…

    • 2829 Words
    • 12 Pages
    Good Essays