Home

Chapter 10: Security

  • 10.0 Security
    • 10.0.1 Introduction
      • 10.0.1.1 Introduction
  • 10.1 Security Threats
    • 10.1.1 Types of Security Threats
      • 10.1.1.1 Adware, Spyware, and Phishing
      • 10.1.1.2 Viruses, Worms, Trojans, and Rootkits
      • 10.1.1.3 Web Security
      • 10.1.1.4 InPrivate Browsing
      • 10.1.1.5 Spam
      • 10.1.1.6 TCP/IP Attacks
      • 10.1.1.7 Worksheet - Security Attacks
    • 10.1.2 Access to Data and Equipment
      • 10.1.2.1 Social Engineering
      • 10.1.2.2 Data Wiping, Hard Drive Destruction, and Recycling
  • 10.2 Security Procedures
    • 10.2.1 Security Policies
      • 10.2.1.1 What Is a Security Policy?
      • 10.2.1.2 Worksheet - Answer Security Policy Questions
      • 10.2.1.3 Security Policy Requirements
      • 10.2.1.4 Usernames and Passwords
      • 10.2.1.5 Password Requirements
      • 10.2.1.6 File and Folder Permissions
      • 10.2.1.7 Lab - Securing Accounts, Data, and the Computer in Windows 7
      • 10.2.1.8 Lab - Securing Accounts, Data, and the Computer in Windows Vista
      • 10.2.1.9 Lab - Securing Accounts, Data, and the Computer in Windows XP
    • 10.2.2 Protecting Data
      • 10.2.2.1 Software Firewalls
      • 10.2.2.2 Biometrics and Smart Cards
      • 10.2.2.3 Data Backups
      • 10.2.2.4 Data Encryption
    • 10.2.3 Protection Against Malicious Software
      • 10.2.3.1 Malicious Software Protection Programs
      • 10.2.3.2 Worksheet - Third-Party Antivirus Software
      • 10.2.3.3 Signature File Updates
    • 10.2.4 Security Techniques
      • 10.2.4.1 Common Communication Encryption Types
      • 10.2.4.2 Service Set Identifiers
      • 10.2.4.3 MAC Address Filtering
      • 10.2.4.4 Wireless Security Modes
      • 10.2.4.5 PT - Wireless Security Techniques
      • 10.2.4.6 Wireless Access
      • 10.2.4.7 Firewalls
      • 10.2.4.8 Worksheet - Research Firewalls
      • 10.2.4.9 Port Forwarding and Port Triggering
      • 10.2.4.10 Lab - Configure Wireless Security
    • 10.2.5 Protecting Physical Equipment
      • 10.2.5.1 Physical Equipment Protection Methods
      • 10.2.5.2 Security Hardware
      • 10.2.5.3 Physical Security Activity
  • 10.3 Common Preventive Maintenance Techniques for Security
    • 10.3.1 Security Maintenance
      • 10.3.1.1 Operating System Service Packs and Security Patches
      • 10.3.1.2 Worksheet - Operating System Updates in Windows
      • 10.3.1.3 Data Backups
      • 10.3.1.4 Lab - Data Backup and Recovery in Windows 7
      • 10.3.1.5 Lab - Data Backup and Recovery in Windows Vista
      • 10.3.1.6 Lab - Data Backup and Recovery in Windows XP
      • 10.3.1.7 Configuring Firewall Types
      • 10.3.1.8 Lab - Configure a Windows 7 Firewall
      • 10.3.1.9 Lab - Configure a Windows Vista Firewall
      • 10.3.1.10 Lab - Configure a Windows XP Firewall
      • 10.3.1.11 Maintaining Accounts
  • 10.4 Basic Troubleshooting Process for Security
    • 10.4.1 Applying the Troubleshooting Process to Security
      • 10.4.1.1 Identify the Problem
      • 10.4.1.2 Establish a Theory of Probable Cause
      • 10.4.1.3 Test the Theory to Determine Cause
      • 10.4.1.4 Establish a Plan of Action to Resolve the Problem and Implement the Solution
      • 10.4.1.5 Verify Full System Functionality and, If Applicable Implement Preventive Measures
      • 10.4.1.6 Document Findings, Actions and Outcomes
    • 10.4.2 Common Problems and Solutions for Security
      • 10.4.2.1 Identify Common Problems and Solutions
      • 10.4.2.2 Worksheet - Gather Information from the Customer
  • 10.5 Security
    • 10.5.1 Summary
      • 10.5.1.1 Summary
  • Expand All
  • Collapse All