Wednesday, January 28, 2009

A+ Identify methods for securing wireless communications

CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
In this session, you will learn to:
Objectives
Identify methods for securing wireless communications.
Identify appropriate responses to social engineering attacks.
Install and configure security measures.
Maintain and troubleshoot security measures.
Ver. 1.0 Session 15 Slide 1 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
Increase in the number of wireless computing devices has
Wireless Security
given rise to the need for protecting wireless network
communications.
Ver. 1.0 Session 15 Slide 2 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
Wireless Encryption The protocols that are available to encrypt and secure
Methods
wireless communications are:
WEP
WTLS
802.1x
WPA
802.11i
Ver. 1.0 Session 15 Slide 3 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
The methods that increase the security on wireless access
Security Methods for Wireless Access Points
points are:
User authentication
Data encryption
Anitvirus software
Security patches
MAC filters
Static IP
Use firewall
Change default username
Alter or disable SSID
Configure vendor’s security settings
Ver. 1.0 Session 15 Slide 4 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
Client Configuration The options for increasing the security on wireless clients
Wireless Options
are:
Data encryption
Antivirus software
Security patches
Secure the wireless access point.
Ver. 1.0 Session 15 Slide 5 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
Social engineering is a technique used to obtain
Social Engineering
confidential information by manipulating the computer
system users.
Ver. 1.0 Session 15 Slide 6 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
A social engineering attack is a type of attack that uses
Social Engineering Attacks
g g yp
the steps to gather information from users:
1. Attacker obtains credentials from user
2. Attacker uses credentials to mount attack
User name
Password
2
1
Attacker
T t
Ver. 1.0 Session 15 Slide 7 of 22
Target
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
The most effective way to prevent damage from social
Social Engineering Prevention
engineering attacks is to train individuals to recognize and
respond to these attacks properly.
Types of biometrics are:
Fingerprint scan
Retinal scan
Voice recognition
Face recognition
Biometric authentication token
Ver. 1.0 Session 15 Slide 8 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
and To implement the appropriate security measures you must
Install Configure Security Measures
first install and configure security measures.
As a computer support technician you will need to have the
security knowledge and skills to install the proper measures
so that systems are protected and users can access the
resources they need.
Ver. 1.0 Session 15 Slide 9 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
Windows security policies are Windows configuration
Windows Security Policies
settings that control the overall security behavior of the
system. Policies set centrally
for computer
Configuratio
n settings
Security Settings
node in policy
object
Ver. 1.0 Session 15 Slide 10 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
Windows Firewall is a software-based firewall available
Windows Firewall
with Service Pack 2 for Windows XP.
Ver. 1.0 Session 15 Slide 11 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
Firewall Configuration Most software-based firewalls offer configuration settings for
Software Settings
common security options, such as:
Global security level
Application access
Security log
Unsolicited traffic blocking
Ver. 1.0 Session 15 Slide 12 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
When you select and apply computer security measures,
Computer Security Measures
you must:
Protect system
Protect applications and data
Permit legitimate access
Ver. 1.0 Session 15 Slide 13 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
Activity 15-1
Activity on Configuring
Windows Firewall
Ver. 1.0 Session 15 Slide 14 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
Activity 15-2
Activity on Configuring
NTFS Permissions
Ver. 1.0 Session 15 Slide 15 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
Activity 15-3
Activity on Using File
Encryption
Ver. 1.0 Session 15 Slide 16 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
Maintaining and Troubleshooting Security System security is a ongoing process, so once the security
Measures
measures are installed they must be maintained to:
To avoid attacks.
Troubleshoot in response to user access problems.
Address directly or escalate.
Ver. 1.0 Session 15 Slide 17 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
The common computer security issues are:
Common Computer Security Issues
BIOS security
Biometric security
Authentication
Malicious software
File system security
Data access issues
Backup security
Ver. 1.0 Session 15 Slide 18 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
Common Software Firewall Issues
The common software firewall issues are:
Disabling
Open ports
LAN and VPN traffic
Firewall conflicts
Program dependencies
Outgoing traffic
User errors
Ver. 1.0 Session 15 Slide 19 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
The common wireless client configuration issues are:
Common Wireless Client Configuration Issues
Protocol compatibility
WEP
SSL on WAP
Buffer overflow
Viruses
Data in plain text
Lack of authentication
Site surveys
Unused connections
Ver. 1.0 Session 15 Slide 20 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
The common encryption issues are:
Common Encryption Issues
Effectiveness of encryption:
Computational power
Size of encryption key
New attacks and exploits
Problems with encryption:
Lost or corrupted keys
User does not own data
Ver. 1.0 Session 15 Slide 21 of 22
CIonmsptaTlIliAn gA +W Cinedrotiwficsa XtPio nP:r oPfeersssoionnaal lC Uomsinpgu tAetrt eSnedcuedri tIyn Cstoanllcaetpiotsn and
Supporting Personal Computer Security
In this session, you learned that :
Summary
Protecting wireless communications is necessary to have an
secure wireless communication.
Social engineering is a technique used to obtain confidential
information by manipulating the users of computer system.
The measures that are necessary to be taken to prevent social
engineering attacks.
The steps taken to install and configure security measures.
The issues to be considered for maintaining and
troubleshooting security measures.
Ver. 1.0 Session 15 Slide 22 of 22

No comments:

Linux, CCNA and MCSE Questions: User Managment

Linux, CCNA and MCSE Questions: User Managment