Level 2 Diploma Unit 11 IT Security

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Direct Attacks on Computational Devices
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
FIRST COURSE Essential Computer Concepts. XP New Perspectives on Microsoft Office 2007: Windows XP Edition2 Objectives Compare the types of computers.
COMPUTER CONCEPTS Computer Information Systems. COURSE COMPETENCIES Explain the functions of computer system components. Describe the information processing.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
USER INTERFACE CONTROL MODULE S ECURE IT : Automated Laptop Security System University of Pennsylvania School of Engineering and Applied Science Electrical.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Introduction to Computing: Lecture 3 Computer Systems.
eScan Total Security Suite with Cloud Security
Data Security GCSE ICT.
The Impact of Physical Security on Network Security
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Types of Computers Desktop / Laptop PC / Mac Client / Server.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
The Office Procedures and Technology
Introduction to Computers Personal Computing 10. What is a computer? Electronic device Performs instructions in a program Performs four functions –Accepts.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Data Confidentiality. Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
ROM Read Only Memory “…computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
UNIT 15 WEEK 3 CLASS 1 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Security fundamentals Topic 11 Maintaining operational security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Lesson 8-The Impact of Physical Security on Network Security.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Week1: Introduction to Computer Networks. Copyright © 2012 Cengage Learning. All rights reserved.2 Objectives 2 Describe basic computer components and.
Physical security By Ola Abd el-latif Abbass Hassan.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Physical Security Concerns for LAN Management By: Derek McQuillen.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Technology. HardwareSoftware  Hardware ◦ Monitor ◦ Keyboard ◦ Hard disk drive ◦ Mouse ◦ CPU (Central Processing Unit) ◦ Graphic and sound cards.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
My Computer System Room 219 My Computer System Monitor Books Power Monitor Keyboard Chair Headphones CPU Mouse Pad Power USB.
Module 5: Designing Physical Security for Network Resources
Introduction to Computers Mrs. Gambucci
Computer Information Systems
Level 2 Diploma Unit 11 IT Security
Hardware.
UNIT 19 Data Security 2.
Security Issues.
Business Risks of Insecure Networks
Computers Vocabulary.
Protecting IT systems (2)
Security of Data  
Welcome to all Participants
The bios.
Technology Mrs. Huddleston
Unit 1 insight – Hardware and software of a computer
G061 - Network Security.
Presentation transcript:

Level 2 Diploma Unit 11 IT Security Protecting IT systems Level 2 Diploma Unit 11 IT Security

Physical security Options What physical security exists? What access control exists? How is visibility of data minimised?

Physical security In teams: Conduct a security audit of the college What physical security exists? Locks Biometric controls CCTV What access control exists? Passwords How is visibility of data minimised? Positioning of monitors, locking of screens Passwords on data DO NOT ATTEMPT TO OVERCOME ANY SECURITY MEASURES.

Audit results (29/3/2011) Buildings Data Issue CCTV Key card readers Staff rooms Computer rooms Sensitive areas Workshops Motion sensors Window locks Detectors on LRC exits IT equipment not visible Data Passwords on photocopiers Passwords on user IDs Issue Can read screens in reception by standing behind them No ID required for students

Physical security Hardware and peripheral security Kensington locks Biometric controls CCTV Wireless interception Faraday cage Screened cable IT Firewalls Secure mail and web servers Media-less workstations

Kensington lock Loop the cable through a hole in a piece of furniture, or around a table leg support, a pipe, etc. Lock the other end into the Kensington Lock slot on the laptop Deters theft

Biometric controls Fingerprint scanners Iris recognition Access to laptops Access to memory sticks Iris recognition Access to secure areas

CCTV CCTV helps deter thieves and documents suspicious activities Can automatically trigger alerts based on motion detection by programmable cameras

Faraday cage and screening It is a metal enclosure The shield of a cable protects the internal conductors from electrical noise and prevents signals being intercepted High security meetings are conducted in Faraday cages to prevent any wireless interference

Firewalls permits or denies network transmissions based upon a set of rules protects networks from unauthorized access

Secure servers/DMZ Dual firewalls give additional protection to the internet facing servers These servers are in the “demilitarised zone” The internal network is protected from the untrusted internet

Media less workstations No USB ports No hard disk No optical disk Boots from the network All data and applications stored on the network Cannot be used to copy and remove data