9781111640125_IM_ch05

Security+ Guide to Network Security Fundamentals

  • No School
  • NONE 0
  • Notes
  • 7
  • 100% (1) 1 out of 1 people found this document helpful

This preview shows page 3 - 6 out of 7 pages.

2. Explain the purpose of performing host software baselining. 3. Mention how to configure operating system security and settings as well as deploying the settings. 4. Emphasize the importance of patch management. Securing with Anti-Malware Software 1. Explain that operating system software has continued to add security protections to its core set of features. 2. Explain that one of the first anti-malware software security applications was anti-virus (AV) software. 3. Discuss the methods used by AV products to search for viruses. Anti-Spam 1. Discuss the security risks that spam can pose. Pop-up Blockers and Anti-Spyware 1. Explain that a pop-up is a small Web browser window that appears over the Web site that is being viewed. 2. Discuss pop-up blocking and anti-spyware software. Host-Based Firewalls 1. Explain that a firewall, sometimes called a packet filter, is hardware or software that is designed to prevent malicious packets from entering or leaving computers. Monitoring System Logs 1. Explain the importance of logs and how they are used in computer security. 2. Discuss the importance of operating system and security application logs.
Image of page 3

Subscribe to view the full document.

Security+ Guide to Network Security Fundamentals, Fourth Edition 5-4 Quick Quiz 1 1. ____ involves restricting access to the areas in which equipment is located. Answer: Physical security 2. A(n) ____ device monitors and controls two interlocking doors to a small room. Answer: mantrap 3. A(n) ____ is a document or series of documents that clearly defines the defense mechanisms an organization will employ in order to keep information secure. Answer: security policy 4. A(n) ____ is a record of events that occur. Answer: log Application Security 1. Emphasize that application security includes application development security as well as application hardening and patch management. Application Development Security 1. Emphasize that application development security involves application configuration baselines and secure coding concepts. 2. Discuss application configuration baselines. 3. Explain the secure coding concepts and standards. 4. Emphasize the importance of application hardening and patch management. Securing Data 1. Discuss how the office environment has changed over the last 30 years. 2. Explain data loss prevention (DLP). 3. Use Figure 5-11 to demonstrate the DLP architecture. Teaching Tip Explain the concept of defense-in-depth and the layering of security controls and tools that are necessary in the modern threat environment.
Image of page 4
Security+ Guide to Network Security Fundamentals, Fourth Edition 5-5 Quick Quiz 2 1. ____ security involves application configuration baselines and secure coding concepts.
Image of page 5

Subscribe to view the full document.

Image of page 6
You've reached the end of this preview.
  • '
  • NoProfessor
  • Computer Security, Network Security Fundamentals, Security+ Guide

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern