NETWORKS By : Nicolas Pottier
Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel using computers. Example : Biometrics Example : Password
Licences When users are authorised to use technology legally according to the Operators terms and conditions. Example : Concurrent licensing (Purchased by one user but can be given to third parties.) Example : Single user licensing (Purchased by one user and can only be used by that person.)
Physical security Physical barriers and controls that protect resources from any accidental or deliberate threats. Example : Vaults Example : Locks
Monitoring Keeping surveillance on and/or recording the emissions of a user in order to maintain security or for system improvements. Example : Keystroke monitoring Example : system performance
Network policies Sets of conditions, constraints, and settings that indicate to users how they can or cannot manipulate the network. Example : Disaster recovery (Recovering resources from a critical state due to human or natural disasters.) Example : Archiving data
Codes of ethics and professional conduct Guidelines written by an organization to workers, helping them conduct their actions in accordance with its primary values and ethical standards. Example : The Association for Computing Machinery (ACM)
Data centres A facility used to house computer systems and other component systems. Example : Google server
Energy usage The energy consumption when the technology is at a full potential and working efficiently, day in and day out. Example : Uninterruptible power supply (capability of switching to a back up generator in the circumstance that there is a power cut, therefore no power interruption) Back- up generator
THANK YOU!