Mr C Johnston ICT Teacher

Slides:



Advertisements
Similar presentations
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Advertisements

POSSIBLE THREATS TO DATA
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Security Training Lunch ‘n Learn. Agenda  Threat Analysis  Legal Issues  Threat Mitigation  User Security  Mobile Security  Policy Enforcement.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
For further information computersecurity.wlu.ca
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security Issues and Challenges in Cloud Computing
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Unit 28- Website Development Assignment 1- THEORY P3
Factors to be taken into account when designing ICT Security Policies
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
BTEC IT Unit 02 Lesson 09 Practical Work Briefing – P5, P6, P7
Information Security Technological Security Implementation and Privacy Protection.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
I T Essentials I Chapter 9 JEOPARDY.
1.1 System Performance Security Module 1 Version 5.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Getting a Grip on Mobile Devices. Last year thousands of travellers left personal items in London taxi cabs.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
I T Essentials I Chapter 4 JEOPARDY PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 12 Network Security Policy.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 13 Routine Network Management Tasks.
Small Business Security Keith Slagle April 24, 2007.
Module 11: Designing Security for Network Perimeters.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Chap1: Is there a Security Problem in Computing?.
Mr C Johnston ICT Teacher
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Policies and Security for Internet Access
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Unit 32 – Networked Systems Security
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Computer Security Sample security policy Dr Alexei Vernitski.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Network System Security - Task 2. Russell Johnston.
8 – Protecting Data and Security
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Working at a Small-to-Medium Business or ISP – Chapter 8
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Lesson Objectives Aims You should be able to:
Business Risks of Insecure Networks
Answer the questions to reveal the blocks and guess the picture.
Teaching Computing to GCSE
Securing Windows 7 Lesson 10.
Designing IIS Security (IIS – Internet Information Service)
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Tonight – Finishing off workshop
Presentation transcript:

Mr C Johnston ICT Teacher www.computechedu.co.uk BTEC IT Unit 09 - Lesson 11 Network Security Mr C Johnston ICT Teacher www.computechedu.co.uk

Session Objectives Know risks associated with unsecure networks, Know different security measures which network technicians and managers use to keep a network secure, Carry out a range of different configurations which will help to protect a network from potential security threats.

Network Security Networks are part of our everyday lives and are often as risk from potential security threats, Ensuring that network are secure is paramount not only to protect the data which is held on servers but also the potential impact of network failure can be financially costly. As a network administrator you must ensure that: Security software is up to date on all clients and servers, Firewalls are check regually, Privileges (who has access to what and why) are checked frequently, No business decision will compromise the network and vice versa.

Identity Spoofing (IP Address Spoofing) Hijacking Trojans / Trojan Humans Identity Spoofing (IP Address Spoofing) Hijacking USB drives / optical media Sniffing Eavesdropping Wireless access points / WIFI Data Modification Potential Network Security Threats Potential Network Security Threats Lack of employee alertness Mapping Social engineering DoS (denial of service attacks) Flooding Employees bringing in own devices Man-in-the-Middle Attack Compromised-Key Attack Password-Based Attacks E-mail Application-Layer Attack

Security Measures Password policies Authentication techniques Access control list Permissions and user rights Backing up and restoring Encrypting Biometrics Vetting and control of personnel Physical security measures (CCTV, Lock and key) Firewalls Software protection

Making Network Secure Activities Activities which can help to make a network secure include: Creating a new user account with a sensible username and password, Apply permissions to the account for group membership, restrict login hours, restrict machines can log into etc. Create a security group and add users to it, Create a group policy object to restrict what users have access to on a client machine, Set authorisation permissions for the user to access a shared drive or folder on the network, Grant the user with Read, Write and Execute access controls to a shared drive or folder on the network, Create a password policy on the server, Set an access control rule on the servers file wall – open up / restrict ports, Schedule a folder to be backed up to either the NAS box or to tape, Delete and then restore the folder from the last available back‐up, Encrypt the data stored in the shared drive or folder so that it remains secure, Review the physical security of the server and recommend how this could be improved, Install Anti-Virus software on a client machine and ensure its scheduled to automatically scan the machine and update, Install a screen saver with a password on a client workstation, Remove a virus using Antivirus software.

Activity Guidance P6 requires you to complete as many of the activities on the list as possible, Some activities can be done on the E108 network others can be done on stand alone machines – Some software will be available to assist you on my website, Create screenshot evidence to illustrate each activity.

Impacts on Loss of Network Service You have looked at potential problems associated with network security breaches and some of the measures which can be taken to prevent them…. M3 requires you to report on the impacts to business of network security breaches – Impacts are the problems which occur and how they affect the organisation as a result of network security breaches.

Impacts to Consider For each of the impacts listed below you need to give as many examples are you can along with measures which can be taken to prevent them arising. The impact of loss of service, The impact of loss of business or income e.g. through loss of customer records, Potential increased costs, The impact of loss of confidentially, The impact of compromised data integrity, The impact of potential security issues caused by a viral infections, malware, Trojans, worms, spyware and adware. You may choose to present your evidence for this task within a table or report – use the impacts above as headings.

Programming Constructs P6 – Make a networked system secure M3 – Report on the business risks of insecure networks and how they can be minimised Programming Constructs P6 will be evidenced with observation records and/or witness statements, which should be supplemented with screen shots and other paperwork to show what activities have been carried For M3 you need to try and apply the risks to VeNew - the verb report suggests that you simply give information on the fact requested.