PPT ch18
PPT ch18
Edition
Chapter 18
Security Strategies
Objectives
• Lock a Workstation
– Quickest way to lock a workstation is to press the Win
+L
– Another method is to press Ctrl+Alt+Delete
• User clicks Lock
• To unlock, user must enter password
• Disable the Guest account
– Disabled by default and should remain disabled
– Set up an account for visitors, create a standard
account and name it Visitor
Figure 18-28 A UTM appliance is considered a next-generation firewall that can protect a private network
Figure 18-31 This phishing technique using an email message with an attached file
is an example of social engineering
• Viruses
– Replicates by attaching itself to other programs
• Program might be an application, macro, Windows
system file, or a boot loader program
• Spyware software
– Spies on user and collects personal information
– An example: Keylogger
• Tracks all keystrokes
• Rootkit
– Virus that loads itself before the OS boot is complete
– Can hide folders that contain software it has installed
– Can hijack internal Windows components so it masks
information Windows provides to user mode utilities
• Ransomware
– Holds your computer system hostage until you pay
money
• Zero-day attack
– Can happen when a hacker discovers a security hole
A+ Guide to IT Technical Support, 9th Edition 43
© Cengage Learning 2017
What Are We Up Against?
• Man-in-the-middle attack
– Attacker presents a program or himself as someone
else to obtain private information
• Zombies and botnets
– Zombie is a computer that has been hacked
• Hacker uses the computer to run repetitive software in
the background
– Botnet is an entire network of zombies
• Dictionary attack
– Used to crack a long password by trying words in a
dictionary
A+ Guide to IT Technical Support, 9th Edition 44
© Cengage Learning 2017
What Are We Up Against?