Level 2 Diploma Unit 11 IT Security

Slides:



Advertisements
Similar presentations
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Mr C Johnston ICT Teacher
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats and Attacks Principles of Information Security, 2nd Edition
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Computer Networks IGCSE ICT Section 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
BUSINESS B1 Information Security.
Viruses & Destructive Programs
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Network System Security - Task 2. Russell Johnston.
Technical Implementation: Security Risks
Chapter 7. Identifying Assets and Activities to Be Protected
3.6 Fundamentals of cyber security
Malware and Computer Maintenance
Network Security (the Internet Security)
IT Security  .
Instructor Materials Chapter 7 Network Security
Jason Ewing Troy Behmer
Systems Security Keywords Protecting Systems
Secure Software Confidentiality Integrity Data Security Authentication
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Business Risks of Insecure Networks
CHAPTER 4 Information Security.
Year 10 ICT ECDL/ICDL IT Security.
Teaching Computing to GCSE
Security in Networking
Computer Security Elaine Munn Introduction to Computer Security.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cybersecurity Awareness
Unit 1.6 Systems security Lesson 3
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
Chapter 9 E-Commerce Security and Fraud Protection
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
– Communication Technology in a Changing World
Cyber security and Computer Misuse
Computer Security By: Muhammed Anwar.
Networking for Home and Small Businesses – Chapter 8
WJEC GCSE Computer Science
Networking for Home and Small Businesses – Chapter 8
G061 - Network Security.
Unit 1.6 Systems security Lesson 1
Introduction to Networking Security
Phishing, Pharming, and Spam
Presentation transcript:

Level 2 Diploma Unit 11 IT Security Threats to security Level 2 Diploma Unit 11 IT Security

Unit outcomes Know the potential threats to the security of IT systems Understand how to protect IT systems Be able to supply security measures

3 Assignments 1) Threats to Security, P1, P2, M1, D1 2) Protecting Systems, P3, M2 3) Security Plans, P4, P5, P6, M3, D2

Today Threats to security Categories of threat Research task: Cost of breaches of security Research task: Cyber damage Password security Research task: Social engineering Research task: Deliberate removal or copying

Categories of threats Weak external security Unauthorised use without damage Unauthorised removal or copying Malware Hardware and media theft or loss Poor folder and file permissions

Why is security an issue? Use intelligent searches on the Internet to: Find the cost (in any currency) of security failures Consider all the categories (previous slide) Prepare a table as a single chart with your results Present your results to the class Category Date Description Cost Theft Jan 1010 Stolen laptops £88,000

Cost of security TYPE OF THREAT LOSS (£ million) Fraud 7,600 (1 fraudulent banker) Credit card fraud 306 (in 1 year) Malware attacks 72 (over 9 years) Software piracy 20,000 (estimated in 2005) Identity theft 90 (1 group of criminals in 2010) Theft 16.2 (3 criminals in 2009)

Weak external security threat What is external security? Prevention of unauthorised software access to a system via: WAN (wide area network) LAN (local area network) Wireless LAN VPN (Virtual Private Network) Exploitation of system weaknesses

Weak external security threat WAN (wide area network) No Firewall means internal servers are exposed to external connections. Web and e-mail servers in Demilitarised Zone (DMZ) allow access from internet Internal network has much stronger protection, blocks unsolicited requests

What does a firewall do? A firewall permits or denies network transmissions based upon a set of rules It protects networks from unauthorized access while permitting legitimate communications to pass Firewalls can be slowed or stopped by DDOS (distributed denial of service attacks)

Research task: cyber damage Find examples of damage caused by: DDOS Unsecured Wireless access point Failure to install security updates Describe the incident, how it was performed, the damage done, the cost of the damage, what weakness was exploited Put your results on slides and present to the class.

Unauthorised access How secure is your password? What is the weakest password you can think of? What is the strongest you can devise? https://www.microsoft.com/en-gb/security/pc-security/password-checker.aspx

Unauthorised access How secure is your password? Written down? Strong or weak? Vulnerable to password crackers? sniffing the network cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks recording VoIP conversations decoding scrambled passwords uncovering cached passwords

Social engineering Phishing Fake IVR (interactive voice response) Baiting Quid pro quo (something for something) Virus hoaxes Each group to research and present (on a slide) what one of these techniques is what the purpose is give an example

Deliberate removal or copying Rick rolling Man in the middle Key stroke loggers Hackers Internal External Logic bomb Each group to research and present (on a slide) what one of these techniques is what the purpose is give an example

Summary Threats to security Categories of threat Research task: Cost of breaches of security Research task: Cyber damage Password security Research task: Social engineering Research task: Deliberate removal or copying