2.0 Security
2.1 Apply and use common prevention methods.
- Physical security
- Lock doors
- Tailgating
- Securing physical documents/passwords/shredding
- Biometrics
- Badges
- Key fobs
- RFID badge
- RSA token
- Privacy filters
- Retinal
- Digital security
- Antivirus
- Firewalls
- Antispyware
- User authentication/strong passwords
- Directory permissions
- User education
- Principle of least privilege
2.2 Compare and contrast common security threats.
- Social engineering
- Malware
- Rootkits
- Phishing
- Shoulder surfing
- Spyware
- Viruses
2.3 Implement security best practices to secure a workstation.
- Setting strong passwords
- Requiring passwords
- Restricting user permissions
- Remote backup applications
- Changing default user names
- Disabling guest account
- Screensaver required password
- Disable autorun
2.4 Given a scenario, use the appropriate data destruction/disposal method.
- Low level format vs. standard format
- Hard drive sanitation and sanitation methods
- Physical destruction
- Shredder
- Drill
- Electromagnetic
- Degaussing tool
2.5 Given a scenario, secure a SOHO wireless network.
- Change default user-names and passwords
- Changing SSID
- Setting encryption
- Disabling SSID broadcast
- Enable MAC filtering
- Antenna and access point placement
- Radio power levels
- Assign static IP addresses
2.6 Given a scenario, secure a SOHO wired network.
- Change default usernames and passwords
- Enable MAC filtering
- Assign static IP addresses
- Disabling ports
- Physical security
|