Mr C Johnston ICT Teacher www.computechedu.co.uk BTEC IT Unit 05 - Lesson 12 Network Security Policy.

Slides:



Advertisements
Similar presentations
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Mr C Johnston ICT Teacher
An Introduction to System Administration Chapter 1.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
15.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Network security policy: best practices
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Threats to I.T Internet security By Cameron Mundy.
BTEC IT Unit 02 Lesson 09 Practical Work Briefing – P5, P6, P7
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Enforcing Concurrent Logon Policies with UserLock.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
User Manager for Domains.  Manages the user accounts in a domain  It is located in the PDC  While User Manager exists in each NT machine, but it is.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
Mr C Johnston ICT Teacher G055 - Lecture 13 Network Safety and Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 15 Network Tools and Utilities.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 06 Peer-to-Peer VS Client-Server.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
CHAPTER Creating and Managing Users and Groups. Chapter Objectives Explain the use of Local Users and Groups Tool in the Systems Tools Option to create.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 7: Implementing Security Using Group Policy.
NetTech Solutions Security and Security Permissions Lesson Nine.
Module 10: Implementing Administrative Templates and Audit Policy.
Privilege Management Chapter 22.
Mr C Johnston ICT Teacher
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 01 Introduction to Computer Networking.
Chapter 7 Server Management Policies –User accounts –Groups Rights and permissions Examples.
Policies and Security for Internet Access
Windows Administration How to protect your computer.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
CAN YOU GUESS THE PASSWORD You and your teacher are going to work through a program with 5 different passwords. And you need to try and guess them. You.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Understanding Security Policies Lesson 3. Objectives.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Understanding Security Policies
Lesson Objectives Aims You should be able to:
Business Risks of Insecure Networks
Unit 1.6 Systems security Lesson 3
Utilize Group Policy Terminal Server Settings
Lesson 16-Windows NT Security Issues
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Operating System Hardening
PLANNING A SECURE BASELINE INSTALLATION
An Introduction to System Administration
G061 - Network Security.
Presentation transcript:

Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 12 Network Security Policy

Session Objectives Understand the necessity for security procedures and how they can be implemented to ensure that data equipment and data is kept secure

Network Security Policies Network security policies and procedures are in place to strengthen network security and prevent any loss to data with maliciously or accidental, Policies are rules which need to be followed whilst procedures are step by step instructions showing how to complete a task – e.g. blocking a port on the firewall, A typical network policy will have rules governing: Firewall management, Access control lists, Device hardening, Continuous policy review, (penetration testing, security audits, access control lists review) User rights and when to review them.

Network Administration Overview To ensure that users behave themselves there are number of techniques we can use – the next few slides cover some of the basic aspects of network administration.

User Accounts To log onto a network each user needs a unique user account with a username, Each user should have their own username and shouldn’t share because: Its possible to keep a log of who is logged in, Able to keep a history of who is logged in, Provides user with a unique identity on the network, Links user automatically to their files, Allows access rights to be enforced, Can trace any body who breaks the acceptable use policy. Users need to be told not the share / write down their password, Also should be encouraged to change their password regularly and log off workstations when finished – password policies can be used enforce this,

User Groups To make it easier to manage users they are spilt into groups, Groups are then given different security rules or policies and access to different files and folders, The policies then apply to all members in a group – much quicker than granting rights to each user account individually, A basic model is to have three groups but an organisation may have hundreds of different groups all with different levels of access. User 1User 2 User 6 User 3 User 4User 5 User 8User 9 User 13 User 10 User 11User 12 User 7 Group 1 = users Maximum Security Applied Group 2 = PowerUsers Medium Security Applied Group 3 = Administrator Have Full Control

Password Policies One of the easiest ways to hack a network is to guess a users password, Users tend to have silly passwords which can be easily deduced by others – brute force method hacking is very common, Password policy aims to prevent silly passwords from being used by: Ensuring a user account has a password, Allowing users to change their passwords, Setting a minimum length for passwords, Forcing users to frequently change their password, Ensuring passwords contain a mixture of numbers, upper and lower case characters, Blocking accounts for 24hours where the password has been entered incorrectly three times (prevents brute force attack),

Password Policy Examples Setting up password policy Example of a brute force attack Setting up password policy

Login Policies Security policies can also be applied to logging into the network, Network operating systems allow you to: Restrict login times (e.g. 9 till 5 Mon-Fri only), Disable a user or groups of users accounts, Limit the number of concurrent connections, Force accounts to automatically expire on a given day.

Login Policies Example Limiting Jacks logon hours to between 6am and 8pm

WorkStation Policies Workstation Policies apply to the computers users work on, They prevent users from: Changing Settings, Installing Software / Hardware, Customising Machines (screen savers, backgrounds etc), Accessing Certain Software, Normally you will have a Workstation policy for each group of users or type of user, which has an appropriate level of security, To set-up Workstation Policies you select from the what you will allow users to, and not to do.

Workstation Policies Example Setting up a security policy to control how the workstations look and prevent changes

File and Folder Policy To access a file or folder on the network you need to have the correct permissions, Each file or folder can be marked with permissions including: No Access List (File Scan) Read only Add (Write) Change (Modify) Full Control File and Folder policy specifies the permissions files and folders have to each user and group of users.

File and Folder Policy Example No Access - N List (File Scan) - FS Read only - R Add (Write) - W Change (Modify) - M Full Control - FC Shared Users – FS, R PowerUsers – FS, R Admins - FC Document Templates Users – FS, R PowerUsers – FS, R, A, M Admins – FC Private Users – N PowerUsers – FS, R Admins – FC Users Shared Users – FS, R, A, M PowerUsers – FS, R, A, M Admins – FC

Task 1 [P1] You will be given a machine to explore by your tutor – you need to make some notes about the specification of the hardware parts and what each is for, Use photos and system information utilities as evidence within your notes, Include a diagram to show the how data flows between some of the main components. For P1, evidence such as diagrams or photographs with clear supporting notes will be sufficient. An alternative form of evidence is a web page with hot-spots over different components explaining what the components are. The communication between components must be identified. It is possible that everything could be identified within one diagram. P1 - explain the function of computer hardware components