Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 20131 Remote.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Module 5: Configuring Access for Remote Clients and Networks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Data Security in Local Networks using Distributed Firewalls
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Router. Introduction A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Student Troubleshooting Guide. Programs Freezing? Try the Three R’s!
Windows 7 Firewall.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Filtering in Firewall By Fantastic 5. Agenda What is Firewall? Types Of Firewall Pros and Cons Of Different Firewalls What Firewall can do? What Firewall.
Module 11: Remote Access Fundamentals
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Logging into a Remote Desktop Connection. Connecting to ‘Remote Desktop Connection’ through the application.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Monitoring.
Stephanie Mercury.  A firewall allows or blocks traffic into and out of a private network or the user's computer.
Network Security & Accounting
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
The Right Access for the Right People to the Right Applications under the Right Circumstances.
Internet FTP to network. Preliminary Steps a FTP program is used and executed such as WS_FTP LE Information needed –host name –user id –password.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Remote Access Awareness Session Presentation to staff 22 July – 11:00.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
Networking Components Assignment 3 Corbin Watkins.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Computing.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
What is a Firewall?.
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Mitel Networks SX-200 ICP Sales Training Terminology.
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Firewalls Routers, Switches, Hubs VPNs
VPN What, where, who, why when?.
Operating Systems Security
Firewalls Jiang Long Spring 2002.
Data Security in Local Networks using Distributed Firewalls
Firewall.
Module 6 Information Sharing and Communication
AbbottLink™ - IP Address Overview
FIREWALL.
Presentation transcript:

Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote access

Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Employees can connect to a company network when e.g. away from the office or company buildings, or working from home, by using the internet. Providing remote access can mean that the company network is less secure so a firewall should be used.firewall User IDs and passwords must also be used to try to prevent unauthorised access to the network and the company data.IDs and passwords Remote access/connecting remotely

Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton A firewall can be hardware-based or software-based. Both are designed to create a barrier between a private (e.g. company or home) network and a public network (e.g. the internet). Firewalls check the incoming and outgoing network traffic against a set of rules to decide whether or not the traffic is allowed to pass. If it is, it will be allowed through the firewall; if it is not allowed, the traffic will be discarded.incoming outgoing Firewall

Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Traffic arrives at firewall from internet Traffic enters the network if it is allowed by the firewall rules Internet Private network Firewall uses set of rules to check whether or not the traffic can pass Traffic is discarded if it is not allowed by rules set in firewall A record is made in a log stored on the company servers Incoming traffic and firewalls

Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Traffic arrives at firewall from company network Traffic allowed to pass by firewall out of network to the internet if it is allowed by rules InternetPrivate network Firewall uses set of rules to check whether or not the traffic can pass Traffic is discarded if it is not allowed by rules set in firewall A record is made in a log stored on the company servers Outgoing traffic and firewalls

Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton A user ID is to identify the user to the system so that the correct access rights and files/folders can be made available to the user. A password is for security so that only the correct user is allowed access. User ID and password