Presentation is loading. Please wait.

Presentation is loading. Please wait.

All of you will be able to:

Similar presentations


Presentation on theme: "All of you will be able to:"— Presentation transcript:

1 All of you will be able to:
LO: To be able to describe and compare encryption methods and software and network security All of you will be able to: Describe how encryption measures can help keep systems secure (M2) Describe how software and network security can keep systems and data secure (P3, D1) You have to offer them a visual way of understanding system security and disaster recovery. Create a poster, which will be the thrust of your message, it must include: What physical security measures can help keep a system secure P2 You must include the operation of an encryption technique and how it is used M2 How software and network security can keep systems an data secure P3 D1 NB to achieve the D1 you must discuss different ways of recovering form a disaster, you can use short paragraphs to discuss your reasons The poster does not have to be a ‘flat’ style it can be interactive…. Keyword: Encryption Security

2 LO: To be able to describe and compare encryption methods and software and network security
All of you will be able to: Describe how encryption measures can help keep systems secure (M2) Describe how software and network security can keep systems and data secure (P3, D1) Encryption – a Method of converting normal information such as text, images and media into a format which is intelligible unless you are in possession of the key that is the basis of the conversion Software and Network security– To combat intrusion and subversion of a networked computer system and commonplace accidental damage of data and resources Keyword: Encryption Security

3 LO: To be able to describe and compare encryption methods and software and network security
All of you will be able to: Describe how encryption measures can help keep systems secure (M2) Describe how software and network security can keep systems and data secure (P3, D1) Using a table describe and give advantages and disadvantages of each of the following physical security methods: Software and network security Encryption Handshaking RSA Public/private key Prime number Call back Diskless network Use of backups (incremental and differential) Redundancy RAID Mirroring Audit Logs Firewall Configurations Virus Checking Software (include Heuristic) Use of VPNs Intrusion detection systems (Access control lists, routing protocols) Passwords Level of access to data Software updating Disaster recovery Audit Logs Firewall Configurations Virus Checking Software (include Heuristic) Keyword: Encryption Security

4 Feedback on terms with descriptions, advantages and disadvantages.
LO: To be able to describe and compare encryption methods and software and network security All of you will be able to: Describe how encryption measures can help keep systems secure (M2) Describe how software and network security can keep systems and data secure (P3, D1) Progress check: Feedback on terms with descriptions, advantages and disadvantages. Keyword: Encryption Security

5 LO: To be able to describe and compare encryption methods and software and network security
All of you will be able to: Describe how encryption measures can help keep systems secure (M2) Describe how software and network security can keep systems and data secure (P3, D1) Using a table describe and give advantages and disadvantages of each of the following physical security methods: Software and network security Encryption Handshaking RSA Public/private key Prime number Call back Diskless network Use of backups (incremental and differential) Redundancy RAID Mirroring Audit Logs Firewall Configurations Virus Checking Software (include Heuristic) Use of VPNs Intrusion detection systems (Access control lists, routing protocols) Passwords Level of access to data Software updating Disaster recovery Audit Logs Firewall Configurations Virus Checking Software (include Heuristic) Keyword: Encryption Security

6 Can any one of the security methods be called ‘the best’??
LO: To be able to describe and compare encryption methods and software and network security All of you will be able to: Describe how encryption measures can help keep systems secure (M2) Describe how software and network security can keep systems and data secure (P3, D1) Plenary Can any one of the security methods be called ‘the best’?? Discuss Keyword: Encryption Security


Download ppt "All of you will be able to:"

Similar presentations


Ads by Google