Level 2 Diploma Unit 11 IT Security

Slides:



Advertisements
Similar presentations
The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor.
Advertisements

FLCC Instructional Computing Student Orientation Rick Evans, Director, Institutional Computing Services Kay Carlisi, Coordinator, Academic Computing Services.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
 All of you should be able to describe how a network works.  Most of you will be able to identify the main devices necessary for a network.  Some of.
Lesson 1: Understanding Browsers. This unit is a set of investigations into how to protect against digital threats, and how to detect digital crimes.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
1 NTC/TCS Training Dallas 2010 TWO Set-ups Wired and Wireless.
THIN CLIENT COMPUTING USING ANDROID CLIENT for XYZ School.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Click to edit Master subtitle style Assignment 3 Networking Devices Leonard Ehalt.
Chapter 6 of the Executive Guide manual Technology.
HUB Connects multiple workstations, servers, and other devices to a network. Can be used to connect two or more computers to one network port. Handles.
WIRELESS NETWORKS AT HOME Presentation 9 th December 2004 Simon G Fraser.
Year 10 – Chapter 4 – Computer Networks Lesson 2: Setting up a Network Starter Task – Can you think of reasons to set up a network? Why Use Networks? 1.
Protecting Students on the School Computer Network Enfield High School.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
ITGS Networks. ITGS Networks and components –Server computers normally have a higher specification than regular desktop computers because they must deal.
How to make all IP address the same. 7 6.
Networks Mr Hewitt. Objectives By the end of this lesson you will be able to: Compare stand alone, networked and laptop computers Define a Network Explain.
Small Business Security Keith Slagle April 24, 2007.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Home Networks Taught by Gary Gabris. Home Networks What is a home network What good is having one - neat things you can do with one General network info.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
NetTech Solutions Protecting the Computer Lesson 10.
NETWORK COMPONENTS BY REYNALDO ZAMORA. HUB Hubs are devices that serve as the central connection for a network. Its job is to send data from one computer.
Network Components Reginald Randolph Assignment 3 LTEC 4550.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
CSC 116 Nov Administrative Required 2 nd exam will be next week on Wed  Nov 18th It will be short (10 questions) It will only cover chapters.
Assignment # 3 Networking Components By: Jeff Long.
Brooke Thorpe COSC 101-Section 7. Overview What is a Firewall? System designed to prevent unauthorized access to or from a private network Will check.
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
Servelite - Complete IT Solutions. Servelite IT solutions specialize in providing Home solutions and Business solutions. We focus upon delivering quality.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
NAME : SITI NUR SOLEHA BINTI ADAM MATRIX NO : CLASS : 3TSK2 LECTURER’S NAME : PUAN SITI HAJAR BT ZAINAL RASHID.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
School network wireless, and land based By Benjamin Houlton.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Networks Lesson 2 Networks (recap) KS3 COMPUTING KS3 Computing
Information Technology Acceptable Use An Overview
Chapter 7. Identifying Assets and Activities to Be Protected
What they are and how to protect against them
Network Security Solution
What is a Firewall?.
KS3 COMPUTING Networks Lesson 1 Network Intro. KS3 Computing Networks.
Year 11 – Chapter 4 – Computer Networks
HARDENING CLIENT COMPUTERS
Cyber Security By: Pratik Gandhi.
Network Management Checking Performance + Traffic & Configuration
Answer the questions to reveal the blocks and guess the picture.
Welcome To : Group 1 VC Presentation
Contact Norton Antivirus | Norton Antivirus Support UK
Information Security Session October 24, 2005
Jeopardy Security Risks Hardware & Software Computer Types Networking
Design Unit 26 Design a small or home office network
IS4680 Security Auditing for Compliance
Prepared by Brian Mauch, BCom LLB, CEO, BMC Networks November 10, 2017
TWO Set-ups Wired and Wireless.
Unit 36: Internet Server Management
Implementing Client Security on Windows 2000 and Windows XP Level 150
Unit 4 IT Security Kerris Davies.
router Computer address modem Internet hub firewall hacker wifi
Tonight – Finishing off workshop
Cybersecurity at WAJ What is it? Are we at risk?.
Division of Engineering Computing Services
Presentation transcript:

Level 2 Diploma Unit 11 IT Security Security Plan Level 2 Diploma Unit 11 IT Security

Assignment criteria P4 Create a security plan for a small office or home network   P5 Implement a security plan P6 Test a security plan M3 Evaluate implemented security methods D2 Recommend and justify security improvements

Creation Create a security plan for a small office or home network What do we need in a security plan? Assessment of current position Risks Priorities Action items Resources

Assessment What is being assessed? Data and devices What is included?

Assessment Network and systems Current security Desktops Laptops Printers Servers Routers Internet connections Current security What items should be listed here?

Security items Spam filters Firewalls Updates Passwords Anti virus Spam filters Firewalls Updates Passwords Physical security Wireless security Web blocking Backups

Risks What risks do we need to consider? We need a risk assessment. Nature of risk Likelihood 1 = unlikely 5 = almost certain Consequence 1 = minimal 5 = catastrophic Overall risk L x C

Start your security plan The system you are evaluating is the current computing department system Your objective is to review the current arrangements assess the security risks evaluate whether security is effective make recommendations for improvements

Assessing the current system You can investigate yourself A lot of the security is similar in T208 and the computing department rooms You can ask questions You should also establish what data is being protected and whether there are levels of access

Risks Use the slides from the previous lessons to list the specific risks to this computing system