MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.

Slides:



Advertisements
Similar presentations
Internet and Network Safety YKSD Policies. YKSD Board Policies 10 Pages of YKSD Board Policies exist for your protection. They are available from your.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Johnson Logistics Solutions Office of Systems and Information Technology.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
LANs and WANs Network size, vary from –simple office system (few PCs) to –complex global system(thousands PCs) Distinguish by the distances that the network.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Security and backups GCSE ICT.
Computer Networks S3 Prepared by May Lau
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Security Training USAID Information Security.
Information Systems Security
history, hardware, software, safety, and computer ethics
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
By. Sierra Gillette. Acceptable Use  Abiding by the policies and procedures of other networks that are accessed  Being polite and using appropriate.
Advantages of Using a Network By Ryan Riddell. Shared Files The same files can be accessed from different computers on the network Files can be traded,
OARN Database UPDATE – SEPTEMBER We’re Live – and Testing  The site is up and running in Google’s data centers:  The site has been secured: 
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
FIT03.05 Explain features of network maintenance.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Copy of the from the secure website - click on the AccoridaLife.zip link.
Small Office Home Office
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
Networking Network Classification, by there: 3 Security And Communications software.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Cloud Computing By Reedy McGeady. What is Cloud Computing? Cloud Computing is using another organisations computer, which are known as hosts.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Branch of computer security specifically related to the Internet. Security for transactions made over the Internet. Internet security encompasses browser.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
2.4 Cyber-Safety.
Chapter 40 Internet Security.
Port Knocking Benjamin DiYanni.
What is a Firewall?.
Dove science academy Cyber Club
Things To Avoid: 1-Never your password to anyone.
DOVE SCIENCE ACADEMY CYBER CLUB
Internet Basics.
Setting up an online account
Operating Systems Security
2.4 Cyber-Safety.
Rules for Being Safe on the Internet for Kids
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Creating Passphrases Include Examples NOT REQUIRED
Module 2 OBJECTIVE 14: Compare various security mechanisms.
COMPUTER SAFTEY IS IMPORTANT….
Identity Theft Samuel H. Slater.
Session 1 – Introduction to Information Security
Presentation transcript:

MMTK Access control

Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls

Introduction Access control is about ensuring that information is –Accessible to those who are authorized to see it –Not accessible to others In general, do not prevent access to information without good reason Main type of access control are passwords and firewalls.

Passwords Used for authenticate access Not infallible, but an important basic step Use passwords to secure –Computers –Files –Online spaces –Networks

Password tips Don’t reveal your password to anyone else Don’t use personal information as a password Best to choose a random sequence of alphanumeric characters not less than six characters long, using both upper and lower case character, e.g. KH92hw Never use sequential passwords (such as the names of days or months) Don’t reuse passwords (or at least not within a year or two) Change your passwords immediately if you think someone else has had access to them Never use the same password more than once on the same system

Firewalls Firewalls are hardware and software tools which –Prevent unauthorized access to and from computers via the internet –Restrict access to particular services or programmes “Good” traffic can move freely; “bad” traffic is kept out ANY computer or network which is connected to the internet should be firewalled