Stuart Cunningham - Computer Platforms - 2003 COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
CIT In this chapter you will learn how to:  Explain the threats to your computers and data  Describe key security concepts and technologies.
Netiquette Rules.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
BUSINESS B1 Information Security.
Reliability & Desirability of Data
Computer Security. Through your PC, a malicious person can gain valuable information About you and your habits Can steal your files Run programs that.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Security and backups GCSE ICT.
Chapter Fifteen Working with Network Security. Objectives To discover what dangers lurk in that great big world To examine the basic concepts of security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
All about viruses, hacking and backups By Harriet Thomas.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NetTech Solutions Protecting the Computer Lesson 10.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Any criminal action perpetrated primarily through the use of a computer.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Computer Security Sample security policy Dr Alexei Vernitski.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security Keeping you and your computer safe in the digital world.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
8 – Protecting Data and Security
Unit 4 IT Security.
Lesson Objectives Aims You should be able to:
Answer the questions to reveal the blocks and guess the picture.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
G061 - Network Security.
Presentation transcript:

Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11

Stuart Cunningham - Computer Platforms Week 11 Security –Dangers –Attacks –Countermeasures Rights Users –Problems –Support –Training

Stuart Cunningham - Computer Platforms Computer Security Danger! –A variety of situations are dangerous to your computer or network –Standalone systems ‘Walk up’ access –Networked computers Access to one system potentially allows access to entire network Propagation of viruses Remote access –The Internet Essentially allowing ANYONE onto your computer or network Viruses in , downloaded by accident Spam, pop-ups

Stuart Cunningham - Computer Platforms Computer Security Your data is important! –For whatever reason Sensitive business data Personal information –Financial information –Credit Cards –Address, telephone number Research data Information about other people etc. –Plain invasion of privacy / theft –You don’t want someone else getting hold of it! –You don’t want someone corrupting your system or monitoring your activities

Stuart Cunningham - Computer Platforms Computer Security Attacks –Someone (or something) doing stuff to your system(s) When they shouldn’t be! 3 things to worry about –Crackers / Intruders Technically “hacker” is the wrong term Attempt to break into your system Access your data / steal stuff / exploit your machine –Viruses Malicious programs Very infectious Uses the computers resources in some way –Worms Self-replicating Not normally malicious –Just irritating Uses the computers resources in some way

Stuart Cunningham - Computer Platforms Security Countermeasures Physical –Keep machines under lock and key Only give access to those who need it –Remove disk drives, access to ports e.g- disable USB access –Nail down the machine - literally Non-technical –Good, long passwords ‘jL04BM£h&~’ as opposed to ‘fred’ –Don’t let software save your passwords / details ‘AutoComplete’, ‘Password Manager’, etc. –Use an OS / NOS that supports good security Especially when networking E.g.- Windows 2000 / Linux –Keep OS up to date with patches/fixes –Install anti-virus software –Remember to log out

Stuart Cunningham - Computer Platforms Security Countermeasures Enforce log-on and passwords for all users

Stuart Cunningham - Computer Platforms Security Countermeasures Firewall –Restricts access to networks –Filters data packets Intrusion Detection System (IDS) –Monitors network traffic for anything sinister –Flags unusual behaviour –Usually has the ability to block Ports –Close all unused ports –Do not allow un-needed services Authentication –Make sure you know who users are –Only allow authorised users access

Stuart Cunningham - Computer Platforms Security Countermeasures Encryption –Locking information by using a password or key –Hiding data –Secure communications Information in transit can be encrypted –Must be decrypted at the other end Security Policies –Rules that everyone must adhere to Passwords User names Account / Group restrictions Backup / Disaster Recovery –Doesn’t prevent attack –Makes recovering easier

Stuart Cunningham - Computer Platforms Security Rights Set access rights and permissions for files, folders and resources Users –Have to administer each user –Time intensive Groups –Organise similar users into groups E.g.- ‘Sales’ –Administer group rather than user Basic rights: –Read, Write, Execute, List In Windows NT, 2000, XP, 2003 –Done using NTFS ‘New Technology’ File System Also on MacOS, UNIX, Linux and Novell

Stuart Cunningham - Computer Platforms Security Rights Windows

Stuart Cunningham - Computer Platforms Security Rights Novell

Stuart Cunningham - Computer Platforms Computer Rights UNIX / Linux / MacOS - rw- r-- r-- user adm 120 Jan 21 mdt.tex d rw- r-- rwx root root 1024 Feb 6 localWorld Group Owner User / owner Group

Stuart Cunningham - Computer Platforms To err is human… (even more so to blame it on the computer) It can only be attributable to human error?! –People make mistakes Machines don’t! –More and more computer illiterates are using computers! Install bad software Accidentally change config settings Go to dodgy web sites –Things break / blow up / melt We must be able to put right these problems…

Stuart Cunningham - Computer Platforms Methods of support Support staff –Required to solve problems –Look after systems IT Manager Systems Administrator Technician –Can be expensive to hire new staff –Provides ‘on-site’ support Training for existing staff –Attempt to solve the problem before it occurs Stops staff breaking things –Allow staff to be able to solve basic problems –Investing in training brings greater return on technology implementation –Saves money in the long-term –Costs money initially

Stuart Cunningham - Computer Platforms Methods of support Support –Some form is technical support will be required –‘Insurance’ in case of technical failure Especially with specialist equipment –Two main types: On site (in house) support –Involves employing one or more person(s) 3rd Party support –Service Level Agreements –Can take time to solve a problem Maintenance –Checks of equipment working order Routine maintenance checks / tasks –Upgrading equipment and software –Keeping systems performance high –Continually updating any ‘live’ services Especially sales & marketing

Stuart Cunningham - Computer Platforms Week 11 Security –Dangers –Attacks –Countermeasures –Rights Users –Problems –Support –Training