Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
1 Networking For VCE IT By Mark Kelly VCE IT Lecture notes: Vceit.com.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
310KM – Team Assignment: OS Platform of Mobile workforce for Logistics Company Window Mobile OS: Chan Wai Kai Android Operation Systems: Chan Kwok.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
OCR Computing for GCSE © Hodder Education 2011
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Internet Security In the 21st Century Presented by Daniel Mills.
New Data Regulation Law 201 CMR TJX Video.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
Securing Information Systems
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Chapter 13 – Network Security
Security and backups GCSE ICT.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Computer Concepts – Illustrated 8th edition
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
WIRELESS NETWORKS AT HOME Presentation 9 th December 2004 Simon G Fraser.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
Network Security & Accounting
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Networking Network Classification, by there: 3 Security And Communications software.
NETWORKS – DIGITAL SILK SOFTWARE DEVELOPMENT UNIT 4 – OUTCOME 2.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing Interconnect Networks By: Bryan Roberts.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 40 Internet Security.
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Pre-Computer Skills Chapter 4.
Computer Networks.
Methods of Securing LANs
Chapter 17 Risks, Security and Disaster Recovery
Introduction to Computers
Data Security GCSE ICT.
OCR GCSE Computing © Hodder Education 2013 Slide 1
Encryption and Hacking
Securing Windows 7 Lesson 10.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Unit 8 Network Security.
INTERNET SECURITY.
Presentation transcript:

Networked Information Systems Network Security

Network Physical Security File server failure can severely affect network users. Server security: Locked in air-conditioned, alarmed room with barred windows, restricted keys No user access to server Uninterruptible power supply (UPS) protects against blackouts, brownouts and voltage spikes. Accessible fire fighting equipment. Locked floppy disk drives

Network Security Usernames & passwords Passwords are not strong protection – they can be guessed, forgotten or stolen. Characteristics of good passwords Biometric identification actually establishes the identity of a user. Used in high-security environments. Biometric identification is useless if you are trying to authenticate yourself on a server across the globe.

Network Security - Firewall Server & software combination filtering data through an internet connection into an organisation’s internal network Use of filters to examine information Blocking access to certain domain names Banning certain protocols from accessing servers Words and phrases included in packets of information Firewalls use two separate NICs

Network Security Malware protection Virus protection software Firewall Anti – adware programs

Encryption Makes data unreadable to unauthorised people even if a file is stolen. Used on sensitive files on networks (e.g. password lists and secret documents) Web browsers use encryption to connect to a “Secure” SSL (Secure Socket Layers) site. Some people encrypt WEP, for wireless LANs