Computer platforms
Download
1 / 17

- PowerPoint PPT Presentation


  • 310 Views
  • Updated On :

Computer & Network Security & User Support & Training Week 11 COMPUTER PLATFORMS Week 11 Security Dangers Attacks Countermeasures Rights Users Problems Support Training Computer Security Danger! Danger! A variety of situations are dangerous to your computer or network

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about '' - albert


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Computer platforms l.jpg

Computer & Network Security

&

User Support & Training

Week 11

COMPUTER PLATFORMS

Stuart Cunningham - Computer Platforms - 2003


Week 11 l.jpg
Week 11

  • Security

    • Dangers

    • Attacks

    • Countermeasures

      • Rights

  • Users

    • Problems

    • Support

    • Training

Stuart Cunningham - Computer Platforms - 2003


Computer security l.jpg
Computer Security

  • Danger! Danger!

    • A variety of situations are dangerous to your computer or network

    • Standalone systems

      • ‘Walk up’ access

    • Networked computers

      • Access to one system potentially allows access to entire network

      • Propagation of viruses

      • Remote access

    • The Internet

      • Essentially allowing ANYONE onto your computer or network

      • Viruses in email, downloaded by accident

      • Spam, pop-ups

Stuart Cunningham - Computer Platforms - 2003


Computer security4 l.jpg
Computer Security

  • Your data is important!

    • For whatever reason

      • Sensitive business data

      • Personal information

        • Financial information

        • Credit Cards

        • Address, telephone number

      • Research data

      • Information about other people

      • etc.

    • Plain invasion of privacy / theft

    • You don’t want someone else getting hold of it!

    • You don’t want someone corrupting your system or monitoring your activities

Stuart Cunningham - Computer Platforms - 2003


Computer security5 l.jpg
Computer Security

  • Attacks

    • Someone (or something) doing stuff to your system(s)

      • When they shouldn’t be!

  • 3 things to worry about

    • Crackers / Intruders

      • Technically “hacker” is the wrong term

      • Attempt to break into your system

      • Access your data / steal stuff / exploit your machine

    • Viruses

      • Malicious programs

      • Very infectious

      • Uses the computers resources in some way

    • Worms

      • Self-replicating

      • Not normally malicious

        • Just irritating

      • Uses the computers resources in some way

Stuart Cunningham - Computer Platforms - 2003


Security countermeasures l.jpg
Security Countermeasures

  • Physical

    • Keep machines under lock and key

      • Only give access to those who need it

    • Remove disk drives, access to ports

      • e.g- disable USB access

    • Nail down the machine - literally

  • Non-technical

    • Good, long passwords

      • ‘jL04BM£h&~’ as opposed to ‘fred’

    • Don’t let software save your passwords / details

      • ‘AutoComplete’, ‘Password Manager’, etc.

    • Use an OS / NOS that supports good security

      • Especially when networking

      • E.g.- Windows 2000 / Linux

    • Keep OS up to date with patches/fixes

    • Install anti-virus software

    • Remember to log out

Stuart Cunningham - Computer Platforms - 2003


Security countermeasures7 l.jpg
Security Countermeasures

  • Enforce log-on and passwords for all users

Stuart Cunningham - Computer Platforms - 2003


Security countermeasures8 l.jpg
Security Countermeasures

  • Firewall

    • Restricts access to networks

    • Filters data packets

  • Intrusion Detection System (IDS)

    • Monitors network traffic for anything sinister

    • Flags unusual behaviour

    • Usually has the ability to block

  • Ports

    • Close all unused ports

    • Do not allow un-needed services

  • Authentication

    • Make sure you know who users are

    • Only allow authorised users access

Stuart Cunningham - Computer Platforms - 2003


Security countermeasures9 l.jpg
Security Countermeasures

  • Encryption

    • Locking information by using a password or key

    • Hiding data

    • Secure communications

      • Information in transit can be encrypted

    • Must be decrypted at the other end

  • Security Policies

    • Rules that everyone must adhere to

      • Passwords

      • User names

      • Account / Group restrictions

  • Backup / Disaster Recovery

    • Doesn’t prevent attack

    • Makes recovering easier

Stuart Cunningham - Computer Platforms - 2003


Security rights l.jpg
Security Rights

  • Set access rights and permissions for files, folders and resources

  • Users

    • Have to administer each user

    • Time intensive

  • Groups

    • Organise similar users into groups

      • E.g.- ‘Sales’

    • Administer group rather than user

  • Basic rights:

    • Read, Write, Execute, List

  • In Windows NT, 2000, XP, 2003

    • Done using NTFS

      • ‘New Technology’ File System

  • Also on MacOS, UNIX, Linux and Novell

Stuart Cunningham - Computer Platforms - 2003


Security rights11 l.jpg
Security Rights

  • Windows

Stuart Cunningham - Computer Platforms - 2003


Security rights12 l.jpg
Security Rights

  • Novell

Stuart Cunningham - Computer Platforms - 2003


Computer rights l.jpg

- rw- r-- r-- user adm 120 Jan 21 mdt.tex

d rw- r-- rwx root root 1024 Feb 6 local

World

Group

Owner

Computer Rights

  • UNIX / Linux / MacOS

User / owner

Group

Stuart Cunningham - Computer Platforms - 2003


To err is human even more so to blame it on the computer l.jpg
To err is human… (even more so to blame it on the computer)

  • It can only be attributable to human error?!

    • People make mistakes

      • Machines don’t!

    • More and more computer illiterates are using computers!

      • Install bad software

      • Accidentally change config settings

      • Go to dodgy web sites

    • Things break / blow up / melt

  • We must be able to put right these problems…

Stuart Cunningham - Computer Platforms - 2003


Methods of support l.jpg
Methods of support

  • Support staff

    • Required to solve problems

    • Look after systems

      • IT Manager

      • Systems Administrator

      • Technician

    • Can be expensive to hire new staff

    • Provides ‘on-site’ support

  • Training for existing staff

    • Attempt to solve the problem before it occurs

      • Stops staff breaking things

    • Allow staff to be able to solve basic problems

    • Investing in training brings greater return on technology implementation

    • Saves money in the long-term

    • Costs money initially

Stuart Cunningham - Computer Platforms - 2003


Methods of support16 l.jpg
Methods of support

  • Support

    • Some form is technical support will be required

    • ‘Insurance’ in case of technical failure

      • Especially with specialist equipment

    • Two main types:

      • On site (in house) support

        • Involves employing one or more person(s)

      • 3rd Party support

        • Service Level Agreements

        • Can take time to solve a problem

  • Maintenance

    • Checks of equipment working order

      • Routine maintenance checks / tasks

    • Upgrading equipment and software

    • Keeping systems performance high

    • Continually updating any ‘live’ services

      • Especially sales & marketing

Stuart Cunningham - Computer Platforms - 2003


Week 1117 l.jpg
Week 11

  • Security

    • Dangers

    • Attacks

    • Countermeasures

    • Rights

  • Users

    • Problems

    • Support

    • Training

Stuart Cunningham - Computer Platforms - 2003


ad