Presentation is loading. Please wait.

Presentation is loading. Please wait.

Systems Security Keywords Protecting Systems

Similar presentations


Presentation on theme: "Systems Security Keywords Protecting Systems"— Presentation transcript:

1 Systems Security Keywords Protecting Systems
Network forensics, Penetration testing, Network policies, Anti-malware software, Firewalls, Anti-virus, Legislation, Packet sniffing Systems Security Protecting Systems

2 Video Objectives BEGINNER: Explain what is meant by ’network forensics’. ADVANCED: Understand the legalities and consequences of unlawfully intercepting data and the concept of penetration testing. EXPERT: Explore network policies and how they can help protect networks. Starter activity

3 Attacks Define: Objectives Network Forensics Penetration Testing
BEGINNER: Explain what is meant by ’network forensics’. ADVANCED: Understand the legalities and consequences of unlawfully intercepting data and the concept of penetration testing. EXPERT: Explore network policies and how they can help protect networks. Define: Network Forensics Penetration Testing Anti malware Software Firewalls Network Policies Starter activity

4 Network Forensics A branch of digital forensics.
Objectives BEGINNER: Explain what is meant by ’network forensics’. ADVANCED: Understand the legalities and consequences of unlawfully intercepting data and the concept of penetration testing. EXPERT: Explore network policies and how they can help protect networks. A branch of digital forensics. Covers the forensic investigation of networks and their devices attached to them. Primarily involves the examination of data sent across a network (or networks). May involve the use of various forensic techniques including ‘packet sniffing’. Packet sniffing involves the interception of packets across a network. Packet sniffing tools can help users understand what is being sent around the network at the time. Most tools reveal all data sent over the network, although a lot of it may be encrypted! Performing packet sniffing without express written permission of all parties is in breach of UK law. Starter activity

5 Definitions Penetration Testing Anti malware Software Objectives
BEGINNER: Explain what is meant by ’network forensics’. ADVANCED: Understand the legalities and consequences of unlawfully intercepting data and the concept of penetration testing. EXPERT: Explore network policies and how they can help protect networks. Penetration Testing Tests performed under a controlled environment by a qualified person. Checks for current vulnerabilities and explores potential ones in order to expose weaknesses in the system so they cannot be maliciously exploited. May use tools to help them in their duties. Performed by a ‘penetration tester’. Anti malware Software Software with the aim of preventing malware from entering the system. Malware - Otherwise known as ‘malicious software’ Software which can be malicious if damaging to a computer or network. Examples include viruses, worms and trojan horses. Starter activity

6 Firewalls Objectives BEGINNER: Explain what is meant by ’network forensics’. ADVANCED: Understand the legalities and consequences of unlawfully intercepting data and the concept of penetration testing. EXPERT: Explore network policies and how they can help protect networks. Software that performs a ‘barrier’ between a potential attacker and the computer system. Can be held on a server, or a standalone computer. Many have this feature as part of an anti-virus package. Not 100% effective – an attacker could exploit a vulnerability. Monitor application and network usage. Has the ability to block access from certain computer users and disable processes which may be perceived as a threat. Starter activity

7 Network Policies Objectives BEGINNER: Explain what is meant by ’network forensics’. ADVANCED: Understand the legalities and consequences of unlawfully intercepting data and the concept of penetration testing. EXPERT: Explore network policies and how they can help protect networks. Defines how a system can be secured through specific rules or requirements. Explains how particular users should access and treat a system. Specifies rules for use, for example: Who should access particular parts of a system (no distributing of passwords) What systems can be used for (eg. Work only / no personal use) How to handle specific systems like (no passing chain mail) Starter activity


Download ppt "Systems Security Keywords Protecting Systems"

Similar presentations


Ads by Google