1 / 6

Network Security

Network Security. Accidental threats: Hard go guard against, eg. accidently delete files, lost memory sticks. Deliberate threats: Hacker, person deliberately breaking into a computer network

fleur
Download Presentation

Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Security • Accidental threats: • Hard go guard against, eg. accidently delete files, lost memory sticks. • Deliberate threats: • Hacker, person deliberately breaking into a computer network • Malware, programs designed to infiltrate and cause harm to a computer or network, eg. spyware, worms, keyloggers, etc. • Virus, program destroying files and alter performance of operating system • 3 Power surge, causing a spike resulting in loss

  2. Network Security • File server failure can severely affect network users. • Server security: • Locked in air-conditioned, alarmed room with barred windows, restricted keys • No user access to server • Uninterruptible power supply (UPS) protects against blackouts, brownouts and voltage spikes. • Accessible fire fighting equipment.

  3. Network Security • Usernames & passwords • Passwords are not strong protection – they can be guessed, forgotten or stolen. • Characteristics of good passwords; minimum 8 characters, mixed case, combination of letters, digits,

  4. Network Security - Firewall • Server & software combination filtering data through an internet connection into an organisation’s internal network • Use of filters to examine information • Blocking access to certain domain names • Banning certain protocols from accessing servers • Words and phrases included in packets of information • Firewalls use two separate NICs

  5. Network Security • Wireless security: • WAP should be configured so that it does not broadcast a network name • Use Wi-Fi Protected Access to encrypt data as it travels across wireless networks • To secure your network: • Malware protection • Virus protection software • Firewall

  6. Encryption • Makes data unreadable to unauthorised people even if a file is stolen. •  Used on sensitive files on networks (e.g. password lists and secret documents) • Web browsers use encryption to connect to a “Secure” SSL (Secure Socket Layers) site. • Some people encrypt email • WEP, for wireless LANs

More Related