Lab Oratorios
Lab Oratorios
Learning Objectives
Upon completion of this activity, you will be able to:
• Explain the purpose of Google Earth.
• Explain the different versions of Google Earth.
• Explain the hardware and software requirements needed to use Google Earth
(free edition).
• Experiment with Google Earth features such as Help | Tutorial.
• Experiment with Google Earth to explore continents, countries, and places of
interest.
Background
Google Earth is a popular application that executes on the desktop of most
operating systems. It requires a broadband connection to the Internet and displays
Earth as a manipulated 2D, or 3D image. The popular world news channel, CNN,
regularly uses Google Earth to emphasize where a news story has occurred.
At the time of writing this activity, there are three versions of Google Earth. The
version that fits most needs is Google's free version, Google Earth. A Google Earth
Plus version includes GPS support, a spreadsheet importer, and other support
features. The Google Earth Pro version is for professional and commercial use.
The URL http://earth.google.com/product_comparison.html contains a description
of the versions. Use this link to answer the following questions:
Which versions support Tilt and 3D rotation? _Google Earth, Google Earth Plus,
Google Earth Pro. ____________________________
Which Google Earth version supports the highest resolution? _Google Earth
Pro._________________________
To use Google Earth, version 4, minimum computer hardware requirements must
be met:
Scenario
This activity is to be performed on a computer that has Internet access and on
which you can install software.
Estimated completion time, depending on network speed, is 30 minutes.
Task 5: Challenge
Google Earth displays image coordinates in the lower left quadrant of the image.
Use the following URL to learn about different coordinate systems:
http://www.colorado.edu/geography/gcraft/notes/coordsys/coordsys.html. Wikipedia
contains a useful definition of common geographical terms.
Use the geographic coordinate system to describe your home with as much
accuracy and detail as possible.
Task 6: Clean Up
You may be required to remove Google Earth from the computer. If so, perform
these steps:
1. Click Start > Settings > Control Panel.
2. Double-click Add or Remove Programs.
3. Locate and click Google Earth.
4. Click Remove and follow the prompts.
Additional removal information is available from URL
http://earth.google.com/support/bin/answer.py?answer=20738&ctx=sibling.
Unless instructed otherwise, turn off the computer.
Activity 1.4.5: Identifying Top Security Vulnerabilities
Learning Objectives
Upon completion of this activity, you will be able to:
• Use the SANS site to quickly identify Internet security threats.
• Explain how threats are organized.
• List several recent security vulnerabilities.
• Use the SANS links to access other security-related information.
Background
One of the most popular and trusted sites related to defending against computer
and network security threats is SANS. SANS stands for SysAdmin, Audit, Network,
Security. SANS contains several components, each a major contributor to
information security. For additional information about the SANS site, go to
http://www.sans.org/, and select items from the Resources menu.
How can a corporate security administrator quickly identify security threats? SANS
and the FBI have compiled their list of the top 20 Internet Security Attack Targets at
http://www.sans.org/top20/. The list is regularly updated with information formatted
by:
• Operating Systems—Windows, Unix/Linux, MAC
• Applications—Cross-platform, including web, database, Peer-to-Peer, instant
messaging, media
players, DNS servers, backup software, and management servers
• Network Devices—Network infrastructure devices (routers, switches, etc.), VoIP
devices
• Human Elements—Security policies, human behavior, personnel issues
• Special Section—Security issues not related to any of the above categories
Scenario
This lab will introduce students to computer security issues vulnerabilities. The
SANS web site will be used as a tool for threat vulnerability identification,
understanding, and defense.
This lab must be completed outside of the Cisco lab from a computer with Internet
access.
Estimated completion time is one hour.
The SANS Top-20 Internet Security Attack Targets list is organized by category. An
identifying letter indicates the category type, and numbers separate category
topics. Router and switch topics fall under the Network Devices category, N. There
are two major hyperlink topics:
N1. VoIP Servers and Phones
N2. Network and Other Devices Common Configuration Weaknesses
Under Impact, there are several values. The Common Vulnerability Scoring System
(CVSS) severity is displayed and contains a value between 1 and 10.
Task 4: Reflection
The number of vulnerabilities to computers, networks, and data continues to
increase. The governments have dedicated significant resources to coordinating
and disseminating information about the vulnerability and possible solutions. It
remains the responsibility of the end user to implement the solution. Think of ways
that users can help strengthen security. Think about user habits that create security
risks.
∙ Mantener actualizado el equipo.
∙ Descargar archivos de paginas confiables.
∙ Instalar Software originales.
∙ Activar las actualizaciones internas del sistema operativo (firewall, scan diario,
antivirus actualizado.
Task 5: Challenge
Try to identify an organization that will meet with us to explain how vulnerabilities
are tracked and solutions applied. Finding an organization willing to do this may be
difficult, for security reasons, but will benefits students, who will learn how
vulnerability mitigation is accomplished in the world. It will also give representatives
of the organization an opportunity to meet the class and conduct informal intern
interviews.