Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote access
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Employees can connect to a company network when e.g. away from the office or company buildings, or working from home, by using the internet. Providing remote access can mean that the company network is less secure so a firewall should be used.firewall User IDs and passwords must also be used to try to prevent unauthorised access to the network and the company data.IDs and passwords Remote access/connecting remotely
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton A firewall can be hardware-based or software-based. Both are designed to create a barrier between a private (e.g. company or home) network and a public network (e.g. the internet). Firewalls check the incoming and outgoing network traffic against a set of rules to decide whether or not the traffic is allowed to pass. If it is, it will be allowed through the firewall; if it is not allowed, the traffic will be discarded.incoming outgoing Firewall
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Traffic arrives at firewall from internet Traffic enters the network if it is allowed by the firewall rules Internet Private network Firewall uses set of rules to check whether or not the traffic can pass Traffic is discarded if it is not allowed by rules set in firewall A record is made in a log stored on the company servers Incoming traffic and firewalls
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Traffic arrives at firewall from company network Traffic allowed to pass by firewall out of network to the internet if it is allowed by rules InternetPrivate network Firewall uses set of rules to check whether or not the traffic can pass Traffic is discarded if it is not allowed by rules set in firewall A record is made in a log stored on the company servers Outgoing traffic and firewalls
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton A user ID is to identify the user to the system so that the correct access rights and files/folders can be made available to the user. A password is for security so that only the correct user is allowed access. User ID and password