Configuring Computer System and Network
Configuring Computer System and Network
Network Security
• Computer and network security help keep data and equipment safe by giving only the appropriate
people access. Everyone in an organization should give high priority to security, because everyone
can be affected by a breach in security.
• An attack that intentionally degrades the performance of a computer or network can also harm an
organization’s productivity. Poorly implemented security measures that allow unauthorized access to
wireless network devices demonstrate that physical connectivity is not necessary for security
breaches by intruders.
• Security Attacks
• To successfully protect computers and the network, a technician must understand both of the following types of threats to
computer security
• Physical:
• Events or attacks that steal, damage, or destroy such --- equipment as servers, switches, and wiring.
• Data:
• Events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
• Threats to security can come from inside or outside an organization, and the level of potential damage can vary greatly.
Potential threats include the following:
• Internal: Employees who have access to data, equipment, and the
• network. Internal attacks can be characterized as follows:
• o Malicious threats are when an employee intends to cause damage.
• o Accidental threats are when the user damages data or equipment unintentionally.
• External: Users outside an organization who do not have authorized access to the network or resources. External attacks
can be characterized as follows:
• o Unstructured attacks, which use available resources, such as passwords or scripts, to gain access to and run programs
designed to vandalize.
• o Structured attacks, which use code to access operating systems and software.
• Physical loss or damage to equipment can be expensive, and data loss can be detrimental to your business and reputation.
Threats against data are constantly changing as attackers find new ways to gain entry and commit their crimes.
Types of Computer Threats
Viruses, Worms, and Trojan Horses
• Regular testing provides details of any possible weaknesses in the current security plan that should
be addressed. A network has multiple layers of security, including physical, wireless, and data.
Source: www.askbobrankin.com
Figure 4. Most Commonly Known Anti-Virus Software
• Virus protection software, also known as antivirus software, is software designed
to detect, disable, and remove viruses, worms, and Trojans before they infect a
computer. Many organizations establish a written security policy stating that
employees are not permitted to install any software that is not provided by the
company.
• Enabling Windows 7 Firewall
• 1. Open Windows Firewall by clicking the Start button , and then clicking Control
Panel. In the search box, type firewall, and then click Windows Firewall.
• 2. In the left pane, click Turn Windows Firewall on or off. If you're prompted for an
administrator password or confirmation, type the password or provide confirmation.
Turn Windows Firewall on or off link in Windows Firewall.
• 3. Click Turn on Windows Firewall under each network location that you want to
help protect, and then click OK.
• If you want the firewall to prevent all programs from communicating, including
programs that you have previously allowed to communicate through the firewall,
select the Block all incoming connections, including those in the list of allowed
programs check box
Data Encryption
• Encrypting data involves using codes and ciphers. Data encryption can help
prevent attackers from monitoring or recording traffic between resources and
computers. A virtual private network (VPN) is an encryption system that
protects data as though it resides on a private network.
• Port Protection
• Every communication using TCP/IP is associated with a port number. HTTPS,
for instance, by default uses port 443. A firewall is a way of protecting a
computer from intrusion through the ports.
• With port protection, the user can control the type of data sent to a computer
by selecting which ports will be open and which will be secured. Data being
transported on a network is called traffic.
How to Enable Firewall for Windows XP?
• An attacker can access data as it travels over the radio signal. However, you can use a wireless encryption system to
encode data and thereby prevent unwanted capture and use of the data. The following list describes the different
levels of wireless security, from most secure to least secure.
• Lightweight Extensible Authentication Protocol (LEAP): Also called EAP-
Cisco, LEAP is a wireless security protocol created by Cisco to address the
weaknesses in WEP and WPA
• Wi-Fi Protected Access (WPA): An improved version of WEP. It was created as
a temporary solution until 802.11i (a security layer for wireless systems) was fully
implemented
• WEP 128: An enhanced encryption protocol combining a 104-bit key and a 24-
bit initialization vector.
• WEP 64: The first-generation security standard for wireless network.
• No security: Although you can elect to implement no security whatsoever, you
leave your wireless network completely vulnerable to attack.
File and Printer Sharing