Systems Security Keywords Protecting Systems

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Let’s Talk About Cyber Security
POSSIBLE THREATS TO DATA
 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Web server security Dr Jim Briggs WEBP security1.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
 a crime committed on a computer network, esp. the Internet.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Understand Malware LESSON Security Fundamentals.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Information Systems Design and Development Security Precautions Computing Science.
Network System Security - Task 2. Russell Johnston.
8 – Protecting Data and Security
Chapter 40 Internet Security.
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Managing Windows Security
Securing Network Servers
Ilija Jovičić Sophos Consultant.
Instructor Materials Chapter 7 Network Security
Network security threats
Lesson Objectives Aims You should be able to:
Cyber Security By: Pratik Gandhi.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Business Risks of Insecure Networks
Answer the questions to reveal the blocks and guess the picture.
Firewalls.
Securing Information Systems
Teaching Computing to GCSE
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Unit 1.6 Systems security Lesson 3
Computer Viruses.
Malware, Phishing and Network Policies
Information Security Session October 24, 2005
Intrusion Detection & Prevention
Unit 1.6 Systems security Lesson 4
Unit 1.6 Systems security Lesson 2
Fire-wall.
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
Securing Windows 7 Lesson 10.
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Protecting Data and Information
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Anuj Dube Jimmy Lambert Michael McClendon
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Unit 1.6 Systems security Lesson 1
INTERNET SECURITY.
Presentation transcript:

Systems Security Keywords Protecting Systems Network forensics, Penetration testing, Network policies, Anti-malware software, Firewalls, Anti-virus, Legislation, Packet sniffing Systems Security Protecting Systems

Video Objectives BEGINNER: Explain what is meant by ’network forensics’. ADVANCED: Understand the legalities and consequences of unlawfully intercepting data and the concept of penetration testing. EXPERT: Explore network policies and how they can help protect networks. Starter activity

Attacks Define: Objectives Network Forensics Penetration Testing BEGINNER: Explain what is meant by ’network forensics’. ADVANCED: Understand the legalities and consequences of unlawfully intercepting data and the concept of penetration testing. EXPERT: Explore network policies and how they can help protect networks. Define: Network Forensics Penetration Testing Anti malware Software Firewalls Network Policies Starter activity

Network Forensics A branch of digital forensics. Objectives BEGINNER: Explain what is meant by ’network forensics’. ADVANCED: Understand the legalities and consequences of unlawfully intercepting data and the concept of penetration testing. EXPERT: Explore network policies and how they can help protect networks. A branch of digital forensics. Covers the forensic investigation of networks and their devices attached to them. Primarily involves the examination of data sent across a network (or networks). May involve the use of various forensic techniques including ‘packet sniffing’. Packet sniffing involves the interception of packets across a network. Packet sniffing tools can help users understand what is being sent around the network at the time. Most tools reveal all data sent over the network, although a lot of it may be encrypted! Performing packet sniffing without express written permission of all parties is in breach of UK law. Starter activity

Definitions Penetration Testing Anti malware Software Objectives BEGINNER: Explain what is meant by ’network forensics’. ADVANCED: Understand the legalities and consequences of unlawfully intercepting data and the concept of penetration testing. EXPERT: Explore network policies and how they can help protect networks. Penetration Testing Tests performed under a controlled environment by a qualified person. Checks for current vulnerabilities and explores potential ones in order to expose weaknesses in the system so they cannot be maliciously exploited. May use tools to help them in their duties. Performed by a ‘penetration tester’. Anti malware Software Software with the aim of preventing malware from entering the system. Malware - Otherwise known as ‘malicious software’ Software which can be malicious if damaging to a computer or network. Examples include viruses, worms and trojan horses. Starter activity

Firewalls Objectives BEGINNER: Explain what is meant by ’network forensics’. ADVANCED: Understand the legalities and consequences of unlawfully intercepting data and the concept of penetration testing. EXPERT: Explore network policies and how they can help protect networks. Software that performs a ‘barrier’ between a potential attacker and the computer system. Can be held on a server, or a standalone computer. Many have this feature as part of an anti-virus package. Not 100% effective – an attacker could exploit a vulnerability. Monitor application and network usage. Has the ability to block access from certain computer users and disable processes which may be perceived as a threat. Starter activity

Network Policies Objectives BEGINNER: Explain what is meant by ’network forensics’. ADVANCED: Understand the legalities and consequences of unlawfully intercepting data and the concept of penetration testing. EXPERT: Explore network policies and how they can help protect networks. Defines how a system can be secured through specific rules or requirements. Explains how particular users should access and treat a system. Specifies rules for use, for example: Who should access particular parts of a system (no distributing of passwords) What systems can be used for (eg. Work only / no personal use) How to handle specific systems like email (no passing chain mail) Starter activity