Download presentation
Published byMelvyn Hunt Modified over 9 years ago
1
Describe How Software and Network Security Can Keep Systems and Data Secure
P3. M2 and D1 Unit 7
2
Learning Objectives Learn how software and network security can keep systems and data secure
3
Assessment Criteria P3 – Describe how software and network security can keep systems and data secure M2 – Explain the operation and use of an encryption technique in ensuring security of transmitted data Discuss different ways of recovering from a disaster
4
Network and software security
Encryption Techniques – Cipher encryption which is no longer used, RSA encryption – public/ private key WEP for wireless access points WAN connections for routing protocols
5
Call Back Used in dial up systems where network administrators can dial ino a network and the device will call them back. This can only be done from a trusted registered line not any location
6
Handshaking CHAP – Challenge handshake authentication protocol
7
Diskless Networks CD/DVD Drives or USB drives are allowed. They will not have any CD drives on desktops and permissions will mean that these drives even if available cannot be used.
8
Backups Ensuring that backup procedures are in place to ensure that data can be restored if anything goes wrong Incremental backups Differential backups Fire Safe back up Full back ups Archive Backups Raid backups which have a real time mirror image so that they can be restored without redundancy
9
Audit Logs This logs network and database activity
If there is an issue administrators can look through the logs to help them find the problem Works with monitoring systems which enable alarms to be place on a system, alerting system administrators to potential suspicious activity e.g. Syslog
10
Firewall Configurations
This blocks unwanted traffic from organisations Explain difference between internal and external systems Explain NAT UDP Ports and TCP Ports
11
Virus Checking Software
Explain how anti virus programs work
12
VPN Explain what a VPN is and protocols used to protect snooping
13
Intrusion Detection Systems
These will look for attacks on the network from hackers and tools they may use Some will be passive and record attempts and then be reviewed by admin controller Some will be reactive and reconfigure the firewall to block the intrusion Explain Access Control Lists ACL’s and Routing Protocols
14
Explain Passwords How are passwords used and explain strong passwords
15
Access levels Explain levels of access to data Read Write
Execute Privilege
16
Updating Software Ensure that latest updates are installed will ensure security is maintained,
17
Disaster Recover Disaster Recovery Backups Systems
Whole System replacement very rare Tiers of Recovery
18
Merit Explain in detail how RSA encryption works
Use this website to help you
19
Distinction Create a brochure to show how an organisation can recover from a disaster. You must discuss different ways a business can recover from a disaster include: Different backups and restores, whole system replacement. Tiers of recovery and discuss the scenarios of how they will be used
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.