9781111640125_IM_ch01

Security+ Guide to Network Security Fundamentals

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 1-1 Chapter 1 Introduction to Security At a Glance Instructor’s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional Resources Key Terms
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 1-2 Lecture Notes Overview Chapter 1 introduces security fundamentals that form the basis of the Security+ certification. It begins by examining the current challenges in computer security and why it is so difficult to achieve. It then describes information security in more detail to illustrate why it is important. Finally, the chapter looks at who is responsible for these attacks and what the fundamental defenses against attackers are. Chapter Objectives Describe the challenges of securing information Define information security and explain why it is important Identify the types of attackers that are common today List the basic steps of an attack Describe the five steps in a defense Teaching Tips Challenges of Securing Information 1. Explain that there is no simple solution to securing information. This can be seen through the different types of attacks that users face today, as well as the difficulties in defending against these attacks. Today’s Security Attacks 1. Describe some typical security warnings, such as the following: a. A malicious program was introduced at some point in the manufacturing process of a popular brand of digital photo frames. b. A Nigerian e-mail scam claimed to be sent from the U.N. c. “Booby-trapped” Web pages are growing at an increasing rate. d. A new worm disables Microsoft Windows Automatic Updating and the Task Manager. e. Apple has issued an update to address 25 security flaws in its operating system OS X. f. The Anti-Phishing Working Group (APWG) reports that the number of unique phishing sites continues to increase. g. Researchers at the University of Maryland attached four computers equipped with weak passwords to the Internet for 24 days to see what would happen. These computers were hit by an intrusion attempt on average once every 39 seconds.
Background image of page 2
Security+ Guide to Network Security Fundamentals, Fourth Edition 1-3 2. Mention that security statistics bear witness to the continual success of attackers: a. TJX Companies, Inc. reported that over 45 million customer credit card and debit card numbers were stolen by attackers over an 18 month period from 2005 to 2007. b. Table 1-1 lists some of the major security breaches that occurred during a three- month period. c. The total average cost of a data breach in 2007 was $197 per record compromised.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 11

9781111640125_IM_ch01 - Security+ Guide to Network Security...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online