Network Security & Accounting

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Security+ Guide to Network Security Fundamentals
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
MJ10/07041 Session 10 Accounting, Security Management Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Computer Networks IGCSE ICT Section 4.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Protecting ICT Systems
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Chapter 4: Computer Networks
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Data Confidentiality. Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Today’s Lecture Covers < Chapter 6 - IS Security
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Module 11: Designing Security for Network Perimeters.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
A Network Security -Firewall Bruce Turin.
Higher Computing Networking. Networking – Local Area Networks.
Computer Security By Duncan Hall.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Policies and Security for Internet Access
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Unit 32 – Networked Systems Security
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Unit 2 Personal Cyber Security and Social Engineering Part 2.
The Functions of Operating Systems Network Operating Systems (NOS)
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
8 – Protecting Data and Security
Unit 27: Network Operating Systems
Planning and Security Policies
Firewalls and Security
G061 - Network Security.
Presentation transcript:

Network Security & Accounting

Introduction Networks have provided access to databases for large numbers of people International telecommunications have enabled global access to data and information This has offered tremendous benefits, but also created security problems: Data may be accessed illegally, stolen, altered or even deleted Consequently, we need methods to secure data on networked computers ICT5

Company Security Policies Any reputable company should have a networks security policy All employees: should be aware of the risks to data should follow rules and procedures be alert to possible security breaches be aware of potential dangers of internet access: downloading programs opening email attachments use virus protection software not leave terminal logged on when unattended ICT5

Access privileges These define which computers, files, applications and data a user can access Typical access levels include: No access; Read only; Read and copy; Read and update. Think of examples within different scenarios ICT5

Access control May be based on: What you know password or PIN number - many shortcomings What you have ID card - smart card or magnetic stripe card Where you are access may be only from a specified location or phone number - callback system Who you are biometric identification by handprint, retinal image or voice print All methods are less effective if users are careless. Auto logoffs to try and counter carelessness ICT5

Firewalls Software that prevents unauthorised communication into or out of the network. The firewall is generally placed between internal LANs and WANs and external networks such as the Internet. Various different types are available, such as: Router - examines each incoming packet of data, checking its source or destination address. Access rules must identify every type of packet that the organisation does not want to admit; Special software that restricts traffic to a particular application such as e-mail or Lotus Notes groupware; A ‘proxy server’ - that maintains replicated copies of Web pages for easy access by a designated class of users. ICT5

Audit controls track all activity on a network – for example: What programs have been used; What files have been opened; How many reads and writes have been executed; How many times a server has been accessed. Monitoring software can be applied to the data that has been collected and possibly detect abnormal patterns of use and behaviour by users. ICT5

Performance management Network monitoring software will collect data on: Network availability (i.e. switched on and not working); Response time (time between making a query and receiving a response); Utilisation of hardware resources (CPU, disks, bridges, repeaters, clients and servers); Utilisation of software; Traffic density in each segment of a network. This information can be used to identify bottlenecks and potential problems It can also be used to plan future developments of the network ICT5

Data encryption Prevents confidential data from being read by unauthorised hackers. Makes it incomprehensible to anyone who does not hold the ‘key’ to decode it. Methods include: transposition - characters switched around Substitution - characters replaced by other characters Cryptography serves 3 purposes: Helps to identify authentic users Prevents alteration of the message Prevents unauthorised users from reading the message ICT5