11 hours

Video Transcription

Hello. Welcome back, Cisco Certified Design associate Are you tall eyes in total 0.1.
I'm your instructor. Wait.
In a previous Vito we talked about, I promoted cussed From this video, we will begin to introduce never security Overview.
Here's the pre assessment question which free our security service is offered a through Siskel router Security. True. Three. A trust and identity be integrated. A fright control See Unified A wireless Now our security solution. Thesixty your connectivity e voice messaging security
af en pointe security
G Virtual security gate away It'll be a E and the deed.
Here's the topic of all. Discuss
security legislation. A number of the legislative bodies, along with the public, have insisted on security controls be in place to protect a private information on to make a certain that it is a handled properly. This legislative bodies influence never security by imposing man needs
with which organizations are required to comply.
These requirements, and that includes protecting customer information with regards to privacy and, in some cases, requiring encryption off the data. The United States has growing body of a security legislation that you need to be aware off
US public company accounting reform and a Master Protection Act of two on two
Serbians Oxley our socks focuses on the accuracy and controls imposed the companies of financial records. This U S federal law was passed because of the number of incorporate Ana conking scandals. They take place
payment car industry PC I data Security standard D S S P C eyes that they had a security standard that they find how to protect a credit cardholder data including the story agent of transfer of credit card holder information. Many retainers that accept credit cards have to meet a p C i. D. S s a standard
warp a stiff penalties on our subject to regular and recorders audience of for PC ideas as compliance
Gramm Leach Billey Financial Services Modernization Act Over 1999 Jobe a provides protection against the sale all the bank and a company information that regularly bought in a soda by financial institutions.
GOP A also guards against the practice of obtaining private information through false pretense ese
US Health Insurance Portability and Accountability Act. H i p. A HIPAA applies to the protection of a private health information that is used to electronica Lee The purpose is to enable better access to health information,
reduce fraud in a lower the cost of a health care
in the United States. E o Data Protection Directive 95 46 Easy calls for the protection of a people's right to privacy with respect to the processing of a personal data. This table described the security legislation and identifies its appropriation.
Securities writes. It is important to be aware over the different that title of attacks. The data can impact the security of I T systems. Security threats can be classified into the following categories. Reconnaissance. The goal of the reconnaissance is together as much information as possible about the party gave the host network
generally this terribly information gathering is done before and the attack is carried out.
Unauthorized access referred to the act of acting or exploiting the targeting system or a host operating system. The service's and physical access to the targeted host have no one system of honor, but of these data, the attacker can take advantage over Andi. I used to increase his or her privileges.
Socio engineering is another technique for obtaining confidential information from employees
by manipulation as a result of the attacker exploiting the host that can read a change or delete information from the system, causing interruption of service on all data loss. In some cases service disruption attacks aimed at disrupting normal infrastructure service's
that disruption can be cost about a following denial of service DOS attacks
DOS attacks I aim to overwhelm the resource is such his memory CPU and band with that impacted targeted system on deny allegedly meet users access distributed a dos si dos attacks in above the multiple sources working together to deliver the Courtenay data attack at where
automatically adds Used to generate a ram neo for the hackers that are seeking
monetary gains. Malware hostile software used to gain access to gather information or disrupt the normal operations. Spyware software that is used to Upton covert information secretly Disclosure in a modification of the data as data is interested on, the factor can use a packet of sniffing tours
to read it on the where well it is in flight
mein the middle attacks. It can also be used to inject the new information into the data packets. Network abuse. The network can be abused from here to beer file sharing out of a policy network uprising and access to forbidden content on the network is then the messaging systems can be a potential targeted for
spammers to send a solid stated messages. Data leaks that loss of data from the servers or users. Workstations?
Well, we in transit or ah arrest to prevent loss of data that allows a prevention T R P software. It can help to control what data users can transfer identity theft and a fraud.
Would be Attackers. Use a fishing techniques such as the email spam to gather personal information such as user names, passwords and the credit card accounts
by opposing as person who can't be trusted. This table all eyes that categorized the security threats,
security risks to protect the network. Resource is processes in the procedures. Technology needs the address of several security risks. Important network. A capture sticks that can be at risk from security threats include the system of inability data integrity and that they had a confidential
system. Availability should ensure on the interrupted the access to critical network and a computing resource is to prevent a service of disruption and the loss of productivity.
That integrity should ensure that Onley authorized. The users can change critical information and a guarantee the authenticity of data that a confidential the should ensure that only allegedly made. The users can view of sensitive information
to prevent theft, legal liabilities and the damage to the organization.
In addition, a usable returning the hardware and the encryption can significantly reduce the risks associated with the system availability. That integrity and the data confidential. T This table summarizes security risks types of where the descriptions
denial of service DOS attacks try to block or deny access to impact of the availability of network service is these times of the attacks that can interrupt businesses. Transactions caused considerable loss and the damage of the company's reputation. DOS attacks are fairly straightforward to carry out
even buying a skilled Attackers
distributed a DOS de DOS attacks are initiated by multiple sources, locations within the network to increase the attacks. The size and impact de DOS attacks occur when the attacker takes advantage of a vulnerabilities in a network. A host
here are some common theater employment's a network. The host, or ification, fails to process large amounts of data sent to it. We achieve crashes off breaks communication ability. Ah, host or application is unable to handle an unexpected foundation,
such as in properly formatted data on a memory or resource depletion.
Nearly all of those attacks were carried out the way this moving and a flooding methods. This table listed some DOS mitigating IOS software features
Learning Jack Question number one, which three Siskel Technologies came you used to detect in America Rights. Choose three NFL o B. If I will switch module Sea ice The V R P E asked flow go with a B SC
Question number two, which it of Energy's off security systems that are part of the Cisco ecosystem. A. There are no advantages. P There is a suite of products to choose from. See this Cisco ecosystem. Insure that partners can implement the dissolution.
See, there is a partners as well as supporting products. Increase the effectiveness of security systems. Go into D.
In today's brief lecture, we discussed the never security over to yield any questions. Feel free to contact me, otherwise I'll CEO in the next video bye for now

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect