Download presentation
Presentation is loading. Please wait.
1
Configuration for Network Security
Unit 4 – Threats and Vulnerabilities
2
Assessment Outcomes Yellow Task 2: Learning Outcomes
Describe five different types of configuration that can affect network security Learning Outcomes To be able to explain different configuration settings that can affect network security To explain the purpose of five different configuration settings and how they improve security To explain the threats and vulnerabilities that can be reduced by five configuration settings
3
Networking A Network is two or more computers that are connected to eachother. In this definition a ‘computer’ is classed as any device that is used to input, process, and output data including: Desktop Laptop Mobile Phones Tablets Servers
4
Switches A switch is a component which is used within a computer network. A switch has a number of ports and it stores the addresses of all network devices that are directly or indirectly connected to it on each port. As a data packet comes into the switch, its destination address is examined and a direct connection is made between the sending and receiving machines.
5
Why are switches used? A network cable can only have one data packet in it at any instant. So if two or more computers want to place a data packet on to the network at exactly the same time, then a 'data collision' will take place. A network protocol is set up to deal with this. Basically it declares the collided data as unusable and forces the two computers to re-send their data packets at a slightly different time. This is fine for a lightly loaded network with only a few computers on-line. You will not notice the small delay caused by data collisions. But imagine what happens when a hundred PCs are sharing the same network and they are all wanting to send their data packets. This will most likely result in thousands of data collisions per second - each one costing a small amount of time. You will certainly notice the network 'slowing down'. On a large network a switch is used to manage the connections between different computers.
6
How do switches work? As a data packet comes into the switch, its destination address is examined and a direct connection is made between the two machines. This added sophistication compared to a hub means that virtual networks can be set up where only a sub- set of connected computers can see each other. As far as these computers are concerned there are no other machines on the network. Virtual networks are very useful. Consider a school network that is using a switch. The network manager may have set it to create the following networks Student virtual network, all students use this to do their work Administration virtual network, only authorised staff have access
7
Switches: Theory Questions
What is a Switch used for? How do they benefit larger networks? Draw a diagram of 5 computers connecting to a switch and explain how the computers communicate with eachother. Use ict.com/as_a2_ict_new/ocr/A2_G063/3 33_networks_coms/network_components /miniweb/pg3.htm to help.
8
VLAN – Virtual Local Area Network
VLANs are a method of splitting up a single LAN into smaller groups of devices. The whole LAN is still physically connected by cables, but the ‘virtual network’ of devices created through software on the switch restricts the smaller groups from accessing each other directly. This means that they appear to be on a separate network – even though they are all still connected.
9
VLAN Theory Questions What is a VLAN? What are VLANs used for?
How do computers on different VLANs communicate with each other? Draw a diagram of a Network with at least 3 VLANs and explain the purpose of each VLAN.
10
Antivirus What is antivirus? How do the following effect security:
Frequency of virus signature updates. ‘On demand’ scanning settings for downloads and attachments. Scanning frequency. Integration with operating systems and systems.
11
Domain Configuration - Research
What is a domain? How can domains be configured? What is a user? Authentication vs Authorisation Authentication of users. Authorisation of users. User permissions and default behaviours. Creation, maintenance and application of group security policies. Bandwidth throttling. Roaming user profiles and desktops. Remote Desktop Services (RDS). Remote Desktop Protocol (RDP)
12
Anti-Virus and Domain Theory Questions
What is a domain? Explain the difference between Authorisation and Authentication Define: User permissions Group security policies Bandwidth throttling Roaming user profiles and desktops Remote Desktop Services (RDS) Remote Desktop Protocol (RDP)
13
WAMP Servers WampServer is a Web development platform on Windows that allows you to create dynamic Web applications with Apache2, PHP, and MySQL. Apache is a web server that provides access to your server through external connections. PHP is a programming language used to create interactive and secure websites MySQL is a programming language that is used to create databases WAMP therefore allows a user to create a web application that can be accessed externally (like a website) that is interactive and has a database back end!
14
LAMP LampServer is a Web development platform on Linux that allows you to create dynamic Web applications with Apache2, PHP, and MySQL. Apache is a web server that provides access to your server through external connections. PHP is a programming language used to create interactive and secure websites MySQL is a programming language that is used to create databases WAMP therefore allows a user to create a web application that can be accessed externally (like a website) that is interactive and has a database back end!
15
MAMP MampServer is a Web development platform on Mac OS X that allows you to create dynamic Web applications with Apache2, PHP, and MySQL. Apache is a web server that provides access to your server through external connections. PHP is a programming language used to create interactive and secure websites MySQL is a programming language that is used to create databases WAMP therefore allows a user to create a web application that can be accessed externally (like a website) that is interactive and has a database back end!
16
FTP: File Transfer Protocol
FTP is a protocol used for sending files between computers and over the internet. The protocol or standard describes how this file transfer should be take place. How does it happen? The server will be running an "FTP server" application that is constantly listening for transfer requests. Your computer will have an 'FTP client' that sets up the connection to the server. Normally an user-name and password is required to access the server. Once the connection is set up, you can either download files from the server or upload file to the server. Using a FTP server offers advantages of its own. For one, a user can use a program to perform a mass upload to a server, not having to worry about repeatedly having to rebrowse for files and re-upload them using one form. Downloads can also be done on-masse as well. Unfortunately, an FTP server still requires an FTP client to use, and the use of one would be particularly cumbersome to those who just wanted to upload a picture or two.
17
SSH, Remote Access, Remote Desktop Connections
SSH, Remote Access, and Remote Desktop Protocols are all methods that allow a user to connect to machine remotely. SSH uses a terminal (text based) interface to access a machine whereas Remote Desktop Services / Protocol use a GUI.
18
WEB Technologies Questions
Describe the purpose of WAMP, MAMP, and LAMP Explain why a user may want to access a machine remotely Explain two methods that a user could access a machine or their files remotely Explain the purpose of FTP
19
Coursework 1, Task 2: Describe five different types of configuration that can affect network security. Make sure you: Explain what the technology is Explain what it is used for Explain how it helps a user / system Explain how it can improve security Explain how it can pose security threats
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.