Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Mr C Johnston ICT Teacher
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Network Security Testing Techniques Presented By:- Sachin Vador.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Network security policy: best practices
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11.
Bill Trelease VP – CTO Delhi Telephone Company
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
UNIT 15 WEEK 4 CLASS 2 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information Systems Security Operations Security Domain #9.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
All of you will be able to:
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
Module 11: Designing Security for Network Perimeters.
Network Security & Accounting
HalFILE 2.1 Network Protection & Disaster Recovery.
LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Information Systems Design and Development Security Precautions Computing Science.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Slide Template for Module 4 Data Storage, Backup, and Security
Working at a Small-to-Medium Business or ISP – Chapter 8
Module Overview Installing and Configuring a Network Policy Server
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Securing the Network Perimeter with ISA 2004
Business Risks of Insecure Networks
Security of a Local Area Network
IS4680 Security Auditing for Compliance
G061 - Network Security.
Presentation transcript:

Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7

Learning Objectives Learn how software and network security can keep systems and data secure

Assessment Criteria P3 – Describe how software and network security can keep systems and data secure M2 – Explain the operation and use of an encryption technique in ensuring security of transmitted data Discuss different ways of recovering from a disaster

Network and software security Encryption Techniques – Cipher encryption which is no longer used, RSA encryption – public/ private key WEP for wireless access points WAN connections for routing protocols

Call Back Used in dial up systems where network administrators can dial ino a network and the device will call them back. This can only be done from a trusted registered line not any location

Handshaking CHAP – Challenge handshake authentication protocol

Diskless Networks CD/DVD Drives or USB drives are allowed. They will not have any CD drives on desktops and permissions will mean that these drives even if available cannot be used.

Backups Ensuring that backup procedures are in place to ensure that data can be restored if anything goes wrong Incremental backups Differential backups Fire Safe back up Full back ups Archive Backups Raid backups which have a real time mirror image so that they can be restored without redundancy

Audit Logs This logs network and database activity If there is an issue administrators can look through the logs to help them find the problem Works with monitoring systems which enable alarms to be place on a system, alerting system administrators to potential suspicious activity e.g. Syslog

Firewall Configurations This blocks unwanted traffic from organisations Explain difference between internal and external systems Explain NAT UDP Ports and TCP Ports

Virus Checking Software Explain how anti virus programs work

VPN Explain what a VPN is and protocols used to protect snooping

Intrusion Detection Systems These will look for attacks on the network from hackers and tools they may use Some will be passive and record attempts and then be reviewed by admin controller Some will be reactive and reconfigure the firewall to block the intrusion Explain Access Control Lists ACL’s and Routing Protocols

Explain Passwords How are passwords used and explain strong passwords

Access levels Explain levels of access to data Read Write Execute Privilege

Updating Software Ensure that latest updates are installed will ensure security is maintained,

Disaster Recover Disaster Recovery Backups Systems Whole System replacement very rare Tiers of Recovery

Merit Explain in detail how RSA encryption works Use this website to help you http://searchsecurity.techtarget.com/definition/RSA

Distinction Create a brochure to show how an organisation can recover from a disaster. You must discuss different ways a business can recover from a disaster include: Different backups and restores, whole system replacement. Tiers of recovery and discuss the scenarios of how they will be used