VCE IT Theory Slideshows By Mark Kelly Vceit.com Testing Network Security.

Slides:



Advertisements
Similar presentations
VCE IT Theory Slideshows By Mark Kelly Vceit.com Referential Integrity in databases.
Advertisements

VCE IT Theory Slideshows By Mark Kelly Vceit.com Problem Solving Methodology Analysis Activities Revised version: 2013.
VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Mobile computing devices.
VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Intranet, Internet, VPN.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Problem Solving Methodology 4 EVALUATION.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
VCE IT Theory Slideshows - ITA By Mark Kelly Vceit.com Entity Relationship Diagrams (ERD)
VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Power Websites CMS and CSS.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Naming Conventions for solution elements.
USER DOCUMENTATION (Part of the development phase of the PSM) Mark Kelly
Network Security Testing Techniques Presented By:- Sachin Vador.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
VCE IT Theory Slideshows Mobile computing devices By Mark Kelly, Vceit.com iPhone.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Legislation: © OPYRIGHT.
1 Networking Protocols For Unit 1 & 2 IT By Mark Kelly VCE IT Lecture notes: Vceit.com Version 2.
IT Applications Theory Slideshows By Mark Kelly vceit.com Database Design Tools Version 2.
VCE IT Theory Slideshows
IT Applications Theory Slideshows By Mark Kelly Vceit.com Yep – another exciting theory lesson coming up!
IT Applications Theory Slideshows By Mark Kelly Vceit.com WEBSITE DESIGN TOOLS.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Types and contents of On-screen user documentation.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Practices that cause conflict.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Websites & Data.
VCE IT Theory Slideshows
File Management Mark Kelly vceit.com.
Chapter 18 Intruders.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Characteristics of efficient and effective solutions.
IT Theory Slideshows ITA, SD, IT11 By Mark Kelly Vceit.com Project Management Overview.
Signature Based and Anomaly Based Network Intrusion Detection
Organisational System By Mark Kelly vceit.com Version 2 Goals Objectives.
VCE IT Theory Slideshows By Mark Kelly vceit.com Data Types 1 a.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Online community & their tools.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Problem Solving Methodology 3 Development.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Arrays.
VCE IT Theory Slideshows by Mark Kelly study design By Mark Kelly, vceit.com, Begin.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Problem Solving Methodology 1 Analysis.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Websites & Data.
Communications & Networks National 4 & 5 Computing Science.
VCE IT Theory Slideshows by Mark Kelly study design By Mark Kelly, vceit.com, Begin.
VCE IT Theory Slideshows by Mark Kelly study design By Mark Kelly, vceit.com, Begin.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Version 2 – updated for 2016 CLOUD COMPUTING CLOUD COMPUTING.
VCE IT Theory Slideshows by Mark Kelly study design By Mark Kelly, vceit.com, Begin.
VCE IT Theory Slideshows By Mark Kelly vceit.com Version 2 – updated for 2016 Data Types 1 a.
VCE IT Theory Slideshows by Mark Kelly study design By Mark Kelly, vceit.com, Begin.
VCE IT Theory Slideshows by Mark Kelly study design By Mark Kelly, vceit.com, Begin.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Database purposes.
VCE IT Theory Slideshows
VCE IT Theory Slideshows
VCE IT Theory Slideshows
VCE IT Theory Slideshows – ITI Updated for 2016
VCE IT Theory Slideshows
VCE IT Theory Slideshows
VCE IT Theory Slideshows
IT Applications Theory Slideshows
IT Applications Theory Slideshows
IT Applications Theory Slideshows
VCE IT Theory Slideshows by Mark Kelly study design
VCE IT Theory Slideshows by Mark Kelly study design
VCE IT Theory Slideshows by Mark Kelly study design
VCE IT Theory Slideshows
VCE IT Theory Slideshows by Mark Kelly study design Test Data
VCE IT Theory Slideshows
VCE IT Theory Slideshows
VCE IT Theory Slideshows Updated for 2016
VCE IT Theory Slideshows
VCE IT Theory Slideshows
VCE IT Theory Slideshows
VCE IT Theory Slideshows
IT Applications Theory Slideshows
Presentation transcript:

VCE IT Theory Slideshows By Mark Kelly Vceit.com Testing Network Security

Remember Criteria = what is being measured Techniques = how to measure them

Criteria for testing network security Cost of establishing & maintaining security The amount of effort needed to enforce security How long it takes to follow security procedures How quickly security measures kick in when a threat is detected

Criteria for testing network security How reliable the security measures are – can you trust them to work? How accurate the security is – e.g. e.g. false positives, false negatives

Criteria for testing network security How many types of threats the system can cope with How resistant the security is to interference or penetration How up-to-date the security is – can it cope with new threats?

Techniques for testing security Simulate known threats and measure system response in terms of speed, accuracy and effectiveness of its reaction Hire an expert outsider (e.g. a network testing organisation or a reputable “grey hat”) to test the security with a thorough penetration test (“pen test”), and report its weaknesses

Testing Techniques Attempt to ‘socially engineer’ staff to see if anyone divulges sensitive network information (e.g. passwords) Send staff members an unexpected with a (harmless) executable attachment and record how many run it. (The exe file could record its running in a log on the network)

Testing Techniques Test the physical security of the system, including doors, windows, fences, swipe cards etc.

Wardriving Try getting access to a wireless access point from outside the organisation’s grounds.

By Mark Kelly vceit.com These slideshows may be freely used, modified or distributed by teachers and students anywhere on the planet (but not elsewhere). They may NOT be sold. They must NOT be redistributed if you modify them. VCE IT THEORY SLIDESHOWS