jagomart
digital resources
picture1_Ppt For Information Security 74347 | Slide Inf102 Inf102 Slide 07


 221x       Filetype PPTX       File size 1.91 MB       Source: www.ocw.upj.ac.id


File: Ppt For Information Security 74347 | Slide Inf102 Inf102 Slide 07
chapter 7 network security networking essentials presentation id 2008 cisco systems inc all rights reserved cisco confidential 8 chapter 7 sections objectives 7 1 am i at risk explain network ...

icon picture PPTX Filetype Power Point PPTX | Posted on 01 Sep 2022 | 3 years ago
Partial capture of text on file.
           Chapter 7: Network 
           Security
           Networking Essentials
        Presentation_ID                                                                                                © 2008 Cisco Systems, Inc. All rights reserved.              Cisco Confidential                                 8
        Chapter 7 - Sections & Objectives
         7.1 Am I at Risk? 
              • Explain network security threats.
         7.2 Methods of Attack 
              • Explain other types of network security threats.
         7.3 How Can I Protect My Network? 
              • Explain how software tools can mitigate network security threats.
         7.4 How Do Firewalls Protect Networks? 
              • Configure a firewall to control network traffic.
        Presentation_ID                                                                                                © 2008 Cisco Systems, Inc. All rights reserved.              Cisco Confidential                                 9
           7.1 Am I at Risk? 
        Presentation_ID                                                                                                © 2008 Cisco Systems, Inc. All rights reserved.              Cisco Confidential                               10
        Am I at Risk?
        Hackers and Intruders
         What Do They Want?
         When the hacker gains access to the network, four types of threat may arise: 
              Information theft, Identity theft, Data loss / manipulation, and Disruption of 
              service
                                                                           Where Do They Come 
                                                                                From?
                                                                           External threats arise from 
                                                                                individuals working outside of an 
                                                                                organization.
                                                                           Internal threats occur when 
                                                                                someone has authorized access 
                                                                                to the network through a user 
                                                                                account or has physical access 
                                                                                to the network equipment.  
        Presentation_ID                                                                                                © 2008 Cisco Systems, Inc. All rights reserved.              Cisco Confidential                                11
                  Am I at Risk?
                  Social Engineering Attacks
         Social Engineering
              • In the context of computer and network security, social engineering 
                    refers to a collection of techniques used to deceive internal users into 
                    performing specific actions or revealing confidential information.
         Types of Social Engineering
         Three of the most common methods hackers use to obtain information 
              directly from authorized users go by unusual names: pretexting, phishing, 
              and vishing.
        Presentation_ID                                                                                                © 2008 Cisco Systems, Inc. All rights reserved.              Cisco Confidential                               12
The words contained in this file might help you see if this file matches what you are looking for:

...Chapter network security networking essentials presentation id cisco systems inc all rights reserved confidential sections objectives am i at risk explain threats methods of attack other types how can protect my software tools mitigate do firewalls networks configure a firewall to control traffic hackers and intruders what they want when the hacker gains access four threat may arise information theft identity data loss manipulation disruption service where come from external individuals working outside an organization internal occur someone has authorized through user account or physical equipment social engineering attacks in context computer refers collection techniques used deceive users into performing specific actions revealing three most common use obtain directly go by unusual names pretexting phishing vishing...

no reviews yet
Please Login to review.