Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Mr C Johnston ICT Teacher
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Networks IGCSE ICT Section 4.
New Data Regulation Law 201 CMR TJX Video.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Protecting ICT Systems
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
BUSINESS B1 Information Security.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
ACM 511 Introduction to Computer Networks. Computer Networks.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Manga comic industry security information presentation By Dominic Roofe.
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Networking Network Classification, by there: 3 Security And Communications software.
 Face to face  Oral  Written  Visual  Electronic Communication in Administration 2.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
McLean HIGHER COMPUTER NETWORKING Lesson 12 Network Security Requirements Description of computer and network security requirements (confidentiality,
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Computer Security Sample security policy Dr Alexei Vernitski.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Network System Security - Task 2. Russell Johnston.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
8 – Protecting Data and Security
Chapter 40 Internet Security.
Network security Vlasov Illia
Business Risks of Insecure Networks
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
Chapter 6 Networks Communicating and Sharing Resources
WJEC GCSE Computer Science
G061 - Network Security.
Presentation transcript:

Term 2, 2011 Week 3

CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls Wireless security

Information transmitted over networks has a higher degree of security risk than info kept on a company’s premises. Security measures such as usernames, passwords, and firewalls are used by administrators to protect a network. Security risks are greater on vast networks with no central administrator, such as the internet.

The integrity and security of data stored within an information system can be threatened by a number of actions, devices and events. Can be accidental, deliberate or as a result of a power surge.

Accidental threats Some are hard to guard against. Files can be accidentally deleted or sent to the incorrect person via . Portable memory devices (such as USB’s, external hard drives etc.) can be lost or misplaced. These files may be retrievable (if saved to another location), however they may be backup files of original files which have since been deleted. Confidential information in the wrong hands can have critical impacts.

Deliberate threats Includes unauthorised access to computers and networks, either through a hacker bypassing network security, or by finding a flaw in the security structure, or through an authorised user using a password which is predictable or somehow compromised. Unauthorised users can then seek to damage files, use information for their own advantage, or cause other forms of trouble. Networks should be protected from deliberate attacks from malware, such as viruses, worms, Trojans, spyware etc. The affect of a virus can range from simply taking up extensive storage space to destroying files and rendering computers unusable by overwriting the boot sectors on hard drives.

Power surge Occurs when the incoming electrical power increases more than 5% above the normal system voltage (240 volts). A spike (which is momentary surge), can be caused by a lightning bolt striking power lines. It can result in immediate and permanent damage to a computer or network.

Most network require you enter a username and password before you can access the data kept on the network. Some usernames may be assigned to you, others you can choose for yourself. Passwords are often chosen by the individual. Some systems have guidelines the password must satisfy to be compliant. Users are normally encouraged to enter a combination of letters number and sometimes symbols to make their password more secure.

Password protection PasswordAverage time to discover Number of characters Possible combinationsHumanComputer 1363 minutes second hours second days0.02 second months1 second years30 seconds million years59 years

To prevent unauthorised access to data and information, companies protect their intranet with a firewall. To implement a firewall, many companies route all communications through a proxy server. A proxy server is a server outside the company’s network that controls which communications pass into the company’s network (i.e. The firewall screens all incoming and outgoing messages).

A server on a LAN can use one of the 1024 ports available to allow its services to be accessed by external users over the internet. A firewall can be set to block any or all of these ports to restrict access to outsiders. By blocking the incoming ports, external users cannot use that port to hack into the local network. Holes are opened by unblocking a port. This is done to allow legitimate access to the LAN (i.e. Remote users).

Wireless is very convenient, however, it does pose additional security risks. ‘Wardriving’ occurs when a perpetrator drives through areas they suspect might provide easy access and attempts to connect to wireless networks. To avoid unauthorised access, a Wi-Fi network should include a firewall and ensure equipment uses one or more wireless security strategies. Suggested strategies are: not broadcasting the network name, and using Wi- Fi Protected Access (WPA or WPA2), which is a standard that defines how to encrypt data as it travels across wireless networks.

Questions What is the common way for viruses and worms to spread through a network? Describe how verifying the identity of a user can protect a network? Many websites require a password. Do you think a website can be secure? Why/why not? Do you think a website should limit the passwords attempts to 3? What is a firewall? Describe three measures that should be incorporated into a wireless network to restrict access by unauthorised users and to secure the transmission of data. Design a pamphlet for home network users detailing the importance of network security, the issues that can arise if users do not secure their network, and suggestions on how users can secure their network.