Presentation is loading. Please wait.

Presentation is loading. Please wait.

Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.

Similar presentations


Presentation on theme: "Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7."— Presentation transcript:

1 Describe How Software and Network Security Can Keep Systems and Data Secure
P3. M2 and D1 Unit 7

2 Learning Objectives Learn how software and network security can keep systems and data secure

3 Assessment Criteria P3 – Describe how software and network security can keep systems and data secure M2 – Explain the operation and use of an encryption technique in ensuring security of transmitted data Discuss different ways of recovering from a disaster

4 Network and software security
Encryption Techniques – Cipher encryption which is no longer used, RSA encryption – public/ private key WEP for wireless access points WAN connections for routing protocols

5 Call Back Used in dial up systems where network administrators can dial ino a network and the device will call them back. This can only be done from a trusted registered line not any location

6 Handshaking CHAP – Challenge handshake authentication protocol

7 Diskless Networks CD/DVD Drives or USB drives are allowed. They will not have any CD drives on desktops and permissions will mean that these drives even if available cannot be used.

8 Backups Ensuring that backup procedures are in place to ensure that data can be restored if anything goes wrong Incremental backups Differential backups Fire Safe back up Full back ups Archive Backups Raid backups which have a real time mirror image so that they can be restored without redundancy

9 Audit Logs This logs network and database activity
If there is an issue administrators can look through the logs to help them find the problem Works with monitoring systems which enable alarms to be place on a system, alerting system administrators to potential suspicious activity e.g. Syslog

10 Firewall Configurations
This blocks unwanted traffic from organisations Explain difference between internal and external systems Explain NAT UDP Ports and TCP Ports

11 Virus Checking Software
Explain how anti virus programs work

12 VPN Explain what a VPN is and protocols used to protect snooping

13 Intrusion Detection Systems
These will look for attacks on the network from hackers and tools they may use Some will be passive and record attempts and then be reviewed by admin controller Some will be reactive and reconfigure the firewall to block the intrusion Explain Access Control Lists ACL’s and Routing Protocols

14 Explain Passwords How are passwords used and explain strong passwords

15 Access levels Explain levels of access to data Read Write
Execute Privilege

16 Updating Software Ensure that latest updates are installed will ensure security is maintained,

17 Disaster Recover Disaster Recovery Backups Systems
Whole System replacement very rare Tiers of Recovery

18 Merit Explain in detail how RSA encryption works
Use this website to help you

19 Distinction Create a brochure to show how an organisation can recover from a disaster. You must discuss different ways a business can recover from a disaster include: Different backups and restores, whole system replacement. Tiers of recovery and discuss the scenarios of how they will be used


Download ppt "Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7."

Similar presentations


Ads by Google