Chapter Introduction |
|
9.1 |
9.1 |
Explain why security is important |
|
|
9.2 |
9.2 |
Describe security threats |
9.2.1 |
Define viruses, worms, and Trojans |
9.2.2 |
Explain web security |
9.2.3 |
Define adware, spyware, and grayware |
9.2.4 |
Explain Denial of Service |
9.2.5 |
Describe spam and popup windows |
9.2.6 |
Explain social engineering |
9.2.7 |
Explain TCP/IP attacks |
9.2.8 |
Explain data
wiping, hard drive destruction and recycling |
|
|
9.3 |
9.3 |
Identify security procedures |
9.3.1 |
Explain what is required in a basic local security policy |
9.3.2 |
Explain the tasks required to protect physical equipment |
9.3.3 |
Describe ways to protect data |
9.3.4 |
Describe wireless security techniques |
|
|
9.4 |
9.4 |
Identify common preventive maintenance techniques for security |
9.4.1 |
Explain how to update signature files for anti-virus and anti-spyware software |
9.4.2 |
Explain how to install operating system service packs and security patches |
|
|
9.5 |
9.5 |
Troubleshoot security |
9.5.1 |
Review the troubleshooting process |
9.5.2 |
Identify common problems and solutions |
|
|
Chapter Summary |
|
Chapter
Quiz
|
|