G061 - Network Security.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
GCSE ICT Networks & Security..
POSSIBLE THREATS TO DATA
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security, Privacy, and Ethics Online Computer Crimes.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Data Confidentiality. Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
ICT Homework- ICT Security Consultant PowerPoint.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Network Security & Accounting
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Any criminal action perpetrated primarily through the use of a computer.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Security Sample security policy Dr Alexei Vernitski.
Information Systems Design and Development Security Precautions Computing Science.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Network System Security - Task 2. Russell Johnston.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
8 – Protecting Data and Security
Chapter 40 Internet Security.
What they are and how to protect against them
Malware and Computer Maintenance
How to build a good reputation online
Business Risks of Insecure Networks
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Teaching Computing to GCSE
– Communication Technology in a Changing World
Security of People, Property and Information
Data Security GCSE ICT.
Information Security Awareness
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Security of Data  
Unit 4 IT Security Kerris Davies.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

G061 - Network Security

Learning Objective: explain methods for combating ICT crime and protecting ICT systems

Network Security ICT crime often deliberate act of theft stealing data (whether viewing or taking), stealing software or equipment. natural disasters and mistakes by humans can also cause data to be lost or equipment to be damaged networked computers are prone to security problems: hacking (unauthorised access), viruses, spyware, malware

Network Security Preventative measures: Physical Security Software Security

Physical Security lock the computer up security guards/CCTV cameras entry measures to get into room/building security guards/CCTV cameras no floppy/CD/DVD drives prevents copying & theft of data prevents virus being transferred onto computer system disable USB ports memory sticks/removable HDD can’t be used

Software Security firewalls backup encryption biometric security software patches & updates anti-virus & anti-spyware software access rights auditing education of users user IDs, & passwords methods for ensuring passwords remain effective

Backup making copies of current data in case the originals are lost or corrupted (or stolen) back-up is made to removable storage media memory stick, portable HDD, CD-R, DVD-R, magnetic tape…. back-up copy is stored off-site or in different location data can be restored from the back-up if required

Firewall network security device stands between a network and the outside world can either be hardware and/or software based. examines data packets moving into and out of the system configured to permit or deny connections using a set of rules access is denied if not allowed by the rules filters websites users are permitted to visit

Encryption What is encryption? the process of disguising messages so that only the intended recipient can understand them. encrypted data can only be understood by reversing the encryption process (decryption) data is sent in a scrambled form. uses a random process set up using a special key value the data is then decoded at receiver by reversing the encryption process (decryption)

Biometric Security technology used to measure some feature of a person in order to identify them within a security system fingerprint scans fingerprint, finds identifying unique marks, matches/does not match to record in system voice recognition retinal scans facial recognition DNA

Software patches & updates corrects loopholes & bugs in software stops hackers exploiting them and gaining access must regularly update virus data files so new viruses can be detected regular security patches to operating systems & applications to combat security loopholes & bugs

Viruses a virus is a piece of software that is designed to: cause deliberate harm to data stored on a computer replicate itself so that it transfers to other computers removable media used in an infected system can then carry the virus to another machine programs downloaded from the Internet can also spread a virus.

Spyware What?: collects information about a person or organisation without the user’s knowledge can track a user’s keystrokes to find out what is being typed, including passwords Why?: can be used to pass information on to advertisers can be used to find out usernames and passwords used to hack into a user’s bank account

Virus & Spyware Protection install anti-virus software on all computers detects viruses & malware (e.g. spyware) allows removal of infected code from file allows deletion of infected files must regularly update virus data files

Access Rights data is commercially valuable could be stolen or damaged/modified may want to restrict access to data so that no unauthorised changes can be made different users are given different access rights to data legal restrictions on the access to personal data DPA

Levels of Access None user cannot obtain information nor change data Read only user can obtain information but not change the data Read/write user can change data as well as obtain information Append only user cannot change existing data but can add new data Full administrator/supervisor level - can perform all operations

Audit Logs logs are maintained automatically by the system audit logs track: who did what, at which workstation, when it occurred. logs can be used to see which member of staff: accessed particular files other resources web pages.

User IDs & Passwords Why? allow access to user areas stop unauthorised access protect data to make individual users members of groups allow access to files based on access rights allow access to resources – printers, software to be able to monitor use audit logs to comply with the law DPA

User IDs Effectiveness of user ID maintained by: must be unique so can be sure who is doing what can be suspended when user is away e.g. on holiday, leaves the company …. can be linked to resources an individual machine software applications times of use

Passwords Effectiveness of password maintained by: Network Manager: force password change frequently make minimum length password make unrecognisable words only (not in dictionary) must contain numbers and letters (& punctuations) cannot reuse passwords 3 incorrect password attempts  account is locked User: not writing password down make it something others can’t guess – not personal make sure no one is looking when you type it in