Presentation is loading. Please wait.

Presentation is loading. Please wait.

Business Risks of Insecure Networks

Similar presentations


Presentation on theme: "Business Risks of Insecure Networks"— Presentation transcript:

1 Business Risks of Insecure Networks

2 Video A. B.

3 Objectives Know risks associated with unsecure networks
Know different security measures which network technicians and managers use to keep a network secure Carry out a range of different configurations which will help to protect a network from potential security threats.

4 1 Min --- Firewall Test End NO YES Lecture 1 of many Slides
1 minute NO YES End Lecture 1 of many Slides Fun Lesson…..!

5 Employees bringing in own devices USB drives / optical media
Trojans / Trojan Humans Employees bringing in own devices USB drives / optical media Identity Spoofing (IP Address Spoofing) Potential Network Security Threats Potential Network Security Threats Wireless access points / WIFI Lack of employee alertness DoS (denial of service attacks) Social engineering Flooding Man-in-the-Middle Attack Compromised-Key Attack Sniffing Password-Based Attacks Application-Layer Attack

6 Security Measures Password policies Authentication techniques
Access control list Permissions and user rights Backing up and restoring Encrypting Biometrics Vetting and control of personnel Physical security measures (CCTV, Lock and key) Firewalls Software protection

7 Task min Produce a table which describes the different security measures covered on the previous slide. For each security measure describe some of the risk which can prevent. (use Google Docs (share)) Security Measure Description Security Risk Measure Will Help To Prevent

8 Making Network Secure Activities
Activities which can help to make a network secure include: Creating a new user account with a sensible username and password, Apply permissions to the account for group membership, restrict login hours, restrict machines can log into etc. Create a security group and add users to it, Create a group policy object to restrict what users have access to on a client machine, Set authorisation permissions for the user to access a shared drive or folder on the network, Grant the user with Read, Write and Execute access controls to a shared drive or folder on the network, Create a password policy on the server, Set an access control rule on the servers file wall – open up / restrict ports, Schedule a folder to be backed up to either the NAS box or to tape, Delete and then restore the folder from the last available back‐up, Encrypt the data stored in the shared drive or folder so that it remains secure, Review the physical security of the server and recommend how this could be improved, Install Anti-Virus software on a client machine and ensure its scheduled to automatically scan the machine and update, Install a screen saver with a password on a client workstation, Remove a virus using Antivirus software.

9 Impacts on Loss of Network Service
You have looked at potential problems associated with network security breaches and some of the measures which can be taken to prevent them…. Impacts are the problems which occur and how they affect the organisation as a result of network security breaches

10 Impacts to Consider For each of the impacts listed below you need to give as many examples are you can along with measures which can be taken to prevent them arising. The impact of loss of service, The impact of loss of business or income e.g. through loss of customer records, Potential increased costs, The impact of loss of confidentially, The impact of compromised data integrity, The impact of potential security issues caused by a viral infections, malware, Trojans, worms, spyware and adware. You may choose to present your evidence for this task within a table or report (through Google Docs) – use the impacts above as headings.

11 Info Cyber Essential Video Prezi War biking

12 Objectives Know risks associated with unsecure networks
Know different security measures which network technicians and managers use to keep a network secure Carry out a range of different configurations which will help to protect a network from potential security threats.

13 Questions Cwestiwn


Download ppt "Business Risks of Insecure Networks"

Similar presentations


Ads by Google