Business Risks of Insecure Networks

Slides:



Advertisements
Similar presentations
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Advertisements

For further information computersecurity.wlu.ca
Mr C Johnston ICT Teacher
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
New Data Regulation Law 201 CMR TJX Video.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Information Security Technological Security Implementation and Privacy Protection.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1.1 System Performance Security Module 1 Version 5.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 12 Network Security Policy.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Computer Security Sample security policy Dr Alexei Vernitski.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Network System Security - Task 2. Russell Johnston.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Security Risks Todays Lesson Security Risks Security Precautions
8 – Protecting Data and Security
Securing Information Systems
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Securing Network Servers
What they are and how to protect against them
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
3.6 Fundamentals of cyber security
Working at a Small-to-Medium Business or ISP – Chapter 8
Instructor Materials Chapter 7 Network Security
Level 2 Diploma Unit 11 IT Security
Configuring Windows Firewall with Advanced Security
Systems Security Keywords Protecting Systems
Secure Software Confidentiality Integrity Data Security Authentication
Lecture 8. Cyber Security, Ethics and Trust
Lesson Objectives Aims You should be able to:
LAND RECORDS INFORMATION SYSTEMS DIVISION
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Answer the questions to reveal the blocks and guess the picture.
Securing Information Systems
Teaching Computing to GCSE
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Call AVG Antivirus Support | Fix Your PC
CYB 110 Education Begins / tutorialrank.com. CYB 110 All Assignments For more course tutorials visit CYB 110 Week 1 Individual Protecting.
CYB 110 Teaching Effectively-- snaptutorial.com
CYB 110 Education for Service-- tutorialrank.com
Risk of the Internet At Home
Data Security GCSE ICT.
Reconnaissance Report Trillium Technologies
Unit 1.6 Systems security Lesson 2
12 STEPS TO A GDPR AWARE NETWORK
Cybersecurity Am I concerned?
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
Securing Windows 7 Lesson 10.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Tonight – Finishing off workshop
Comodo Dome Data Protection
Presentation transcript:

Business Risks of Insecure Networks

Video A. B.

Objectives Know risks associated with unsecure networks Know different security measures which network technicians and managers use to keep a network secure Carry out a range of different configurations which will help to protect a network from potential security threats.

1 Min --- Firewall Test End NO YES Lecture 1 of many Slides 1 minute NO YES End Lecture 1 of many Slides Fun Lesson…..!

Employees bringing in own devices USB drives / optical media Trojans / Trojan Humans Employees bringing in own devices USB drives / optical media Identity Spoofing (IP Address Spoofing) Potential Network Security Threats Potential Network Security Threats Wireless access points / WIFI Lack of employee alertness DoS (denial of service attacks) Social engineering Flooding Man-in-the-Middle Attack Compromised-Key Attack Sniffing Password-Based Attacks Application-Layer Attack E-mail

Security Measures Password policies Authentication techniques Access control list Permissions and user rights Backing up and restoring Encrypting Biometrics Vetting and control of personnel Physical security measures (CCTV, Lock and key) Firewalls Software protection

Task 1----15 min Produce a table which describes the different security measures covered on the previous slide. For each security measure describe some of the risk which can prevent. (use Google Docs (share)) Security Measure----- Description--------- Security Risk Measure Will Help To Prevent

Making Network Secure Activities Activities which can help to make a network secure include: Creating a new user account with a sensible username and password, Apply permissions to the account for group membership, restrict login hours, restrict machines can log into etc. Create a security group and add users to it, Create a group policy object to restrict what users have access to on a client machine, Set authorisation permissions for the user to access a shared drive or folder on the network, Grant the user with Read, Write and Execute access controls to a shared drive or folder on the network, Create a password policy on the server, Set an access control rule on the servers file wall – open up / restrict ports, Schedule a folder to be backed up to either the NAS box or to tape, Delete and then restore the folder from the last available back‐up, Encrypt the data stored in the shared drive or folder so that it remains secure, Review the physical security of the server and recommend how this could be improved, Install Anti-Virus software on a client machine and ensure its scheduled to automatically scan the machine and update, Install a screen saver with a password on a client workstation, Remove a virus using Antivirus software.

Impacts on Loss of Network Service You have looked at potential problems associated with network security breaches and some of the measures which can be taken to prevent them…. Impacts are the problems which occur and how they affect the organisation as a result of network security breaches

Impacts to Consider For each of the impacts listed below you need to give as many examples are you can along with measures which can be taken to prevent them arising. The impact of loss of service, The impact of loss of business or income e.g. through loss of customer records, Potential increased costs, The impact of loss of confidentially, The impact of compromised data integrity, The impact of potential security issues caused by a viral infections, malware, Trojans, worms, spyware and adware. You may choose to present your evidence for this task within a table or report (through Google Docs) – use the impacts above as headings.

Info Cyber Essential Video Prezi War biking

Objectives Know risks associated with unsecure networks Know different security measures which network technicians and managers use to keep a network secure Carry out a range of different configurations which will help to protect a network from potential security threats.

Questions Cwestiwn