Chapter 19 by jizhen1947


									A+ Guide to Managing and Maintaining your PC, 6e   19-1

Chapter 19
Securing Your PC and LAN

At a Glance

Instructor’s Manual Table of Contents
   Overview

   Objectives

   Teaching Tips

   Quick Quizzes

   Class Discussion Topics

   Additional Projects

   Additional Resources

   Key Terms
A+ Guide to Managing and Maintaining your PC, 6e                                                 19-2

Lecture Notes

        Chapter 19 covers PC and network security. The introductory sections demonstrate how
        to control access to your computer using password protection. Next, a series of security
        techniques and tools are presented. Firewalls, antivirus software, and Windows
        2000/XP NTFS EFS are among the featured items. Students are also shown how to
        combat social engineering and maintain event logs that focus on security. Following the
        presentation of methods for protecting PCs, the discussion shifts to securing wired and
        wireless networks. The latter portion of the chapter is dedicated to malicious software.
        Various types of malware, such as viruses and worms, are described. The final sections
        provide a systematic method for recovering from a malware intrusion

Chapter Objectives
       Learn how to secure a desktop or notebook computer
       Learn how to secure a local wired or wireless network
       Learn how malicious software works and how to clean an infected system

Teaching Tips
Securing Your Desktop or Notebook Computer
    1. Indicate that firewalls are only part of a security system. Due to the potential for internal
       attacks, security loopholes, and exposure during travel, you need to take extra steps to
       protect your PC.

    2. List the extensive methods for securing a network, such as keeping Windows updates
       currents. All of these techniques will be covered in this chapter.

Access Control

    1. Distinguish authentication from authorization. Describe four types of passwords:
       power-on passwords, Windows passwords, online account passwords, and application

    2. Using Figure 19-3 to Figure 19-4, explain how to configure a power-on password in
       CMOS setup. Indicate that you can set a supervisor password and a user password. In
       addition, you can configure how the user password works. Note that in CMOS setup
       you can enable or disable boot sector virus protection so that a virus is less likely to be
       able to change the boot sectors of the hard drive.

    3. Define a strong password. Review the various criteria for creating strong passwords,
       such as combining uppercase and lowercase letters, numbers, and symbols. Define the
       tem, passphrase. Compare passphrases to passwords. Provide additional guidelines for
       using passwords, such as not sending your passwords over e-mail or chat.
A+ Guide to Managing and Maintaining your PC, 6e                                                 19-3

    4. Review the functions of user accounts and user passwords in Windows. Describe the
       role of the administrator in configuring the password. Using Figure 19-7 to Figure 19-9,
       demonstrate how to configure permissions for certain files and folders. Using Figure
       19-12, demonstrate how to use the Cacls command to configure file and folder access.
       Note that, unlike the GUI tool, the command can be used without disabling simple file

    5. Indicate that a protected account will display an authentication dialog box when access
       is attempted (see Figure 19-10 and Figure 19-11).

Teaching       Because Cacls is an external command, you must navigate to \System32 or set
Tip            the path variable to use it. To set the path variable, enter the command path =

Limit Use of the Administrator Account

    1. Remind students of the three common account types used in Windows: Administrator,
       Limited User, and Guest.

    2. Explain why it is important to limit the use of the Administrator account to maintenance
       and installation chores. Advise students to create a Limited User account to perform
       ordinary functions. Show techniques for distinguishing the account types (see Figure

Use a Personal Firewall

    1. Review the purpose of using a software or hardware firewall. Advise student to use a
       firewall to protect a system. Review how to configure the Windows Firewall (see Figure
       19-14). Remind students that Windows Firewall is included in Windows XP Service
       Pack 2.

Use AV Software

    1. Advise students to use antivirus (AV) software to protect a system from malicious
       software (see Figure 19-15). Provide guidelines for using AV software to maximum
       effect, such as configuring the tool to automatically download updates.

    2. Define the term, virus signature. Using the notion of a virus signature, explain why the
       AV software cannot protect a system from an unknown threat.

    3. Review the list of AV software resources in Table 19-1. Also, review the selection
       criteria for purchasing AV software, such as whether it can automatically execute at
A+ Guide to Managing and Maintaining your PC, 6e                                                 19-4

    4. Define the terms, adware and spyware. Notify students that AV software does not
       always stop adware or spyware. Advise students to purchase removal software products,
       such as Ad-Aware, to combat adware and spyware.

Keep Windows Updates Current

    1. Explain why Windows is particularly susceptible to attacks from authors of malicious

    2. Reinforce the need to keep updates current. Advise students they can manually update
       the system with Windows Update or set up a background process to automatically
       download and install updates (see Figure 19-16 and Figure 19-17).

Set Internet Explorer for Optimum Security

    1. Review some of the security settings available in Internet Explorer:

               Pop-up blocker
               The ability to manage add-ons
               The ability to block scripts and disable scripts embedded in Web pages
               Ability to set general security level (Medium is recommended-see Figure 19-18)

Use Alternate Client Software

    1. Explain why popular Microsoft products, such as Internet Explorer and Outlook
       Express, are often targeted by authors of malware. For example, the ActiveX controls
       downloaded into your PC may execute malicious code.

    2. Indicate that alternative software is often less vulnerable to attack than more popular
       counterparts. Advise students to consider utilizing alternative software, such as the
       Mozilla browser by Firefox (see Figure 19-19) and the Eudora e-mail client by

Consider Using Microsoft Shared Computer Toolkit for Windows XP

    1. Describe the Microsoft Shared Computer Toolkit for Windows XP. The toolkit may be
       downloaded for free to users with a valid Windows XP license (see Figure 19-20).

    2. Indicate that if you decide to use this tool, you should first ensure that the drive is
       configured for optimal use. Then you can configure and enable the toolkit. In addition,
       you can configure the toolkit so that Windows updates can be installed when users are
       not working on the computer.
A+ Guide to Managing and Maintaining your PC, 6e                                           19-5

Quick Quiz 1
    1. ____________________ proves that an individual is who he says he is and is
       accomplished by a variety of techniques, including a username, password, personal
       identification number (PIN), smart card, or biometric data.
       Answer: Authentication

    2. ____________________ determines what an individual can do in the system after he or
       she is authenticated.
       Answer: Authorization

    3. True or False. A passphrase is made of several words with spaces allowed.
       Answer: True

    4. Antivirus (AV) software detects a known virus by looking for distinguishing
       characteristics called virus ____________________.
       Answer: signatures

To top