Basic+Security

=Basic Security=
 * Chapter 8 Study Guide to help you focus on the important topics while reading the chapter, this is for your use and will not be graded.
 * ==Objectives==
 * //Key Ideas//...
 * Networking Threats
 * The significance of network security breaches
 * The four categories of network threats
 * External and internal security threats
 * Social Engineering techniques as a mechanism for exploiting human weaknesses
 * Information is a valuable commodity that can be bought, sold, and stolen.
 * Methods of Attack
 * Viruses, worms, and Trojan Horses
 * Denial of Service Attacks (DoS)
 * Distributed Denial of Services Attacks (DDoS)
 * Brute Force Attacks
 * Privacy invading tools including spyware, cookies, adware, and pop-ups
 * Spam
 * Network Defenders Game - learn how to defend your network from all these risks using a fun and addicting game.
 * Security Policy
 * The network security policy best practices
 * Network security procedures
 * Network security tools and applications
 * Using Firewalls
 * The firewall as one of the most effective tools in network security
 * Filtering schemes implemented in firewalls
 * Firewall implementation of Network Address Translation (NAT)
 * The differing forms and structures of firewalls
 * Tools for testing network security
 * Recommended practices for securing networks

Chapter 8 - Basic Security Google Presentation media type="custom" key="4670001" media type="youtube" key="YYGMKFQAbok" height="344" width="425"

Ch 8 Jeopardy Review > media type="custom" key="4761339"
 * ==Assignments==
 * Asynchronous Class Discussion - view Ken Robinson's video below a add to the discussion tab your thoughts on it.
 * Reflective Blog Entry
 * Ch 8 Basic Security Exam