1 / 9

Big Picture

Big Picture. Computer Systems are important for all areas of life Computer systems are vulnerable How could YOU lessen the vulnerabilities in a system?. System Security Part 3. Learning Objectives. To understand what is meant by ‘Vulnerability’ when discussing computer systems

lgough
Download Presentation

Big Picture

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Big Picture Computer Systems are important for all areas of life Computer systems are vulnerable How could YOU lessen the vulnerabilities in a system?

  2. System Security Part 3

  3. Learning Objectives To understand what is meant by ‘Vulnerability’ when discussing computer systems To know what encryption is and the difference between this and hashing

  4. Penetration Testing Prevention is better than Cure Network Forensics Encryption

  5. Penetration Testing Once an organization is aware that their computer systems are vulnerable they can then start to plan policy to reduce and eliminate vulnerabilities. For example, a simple policy is to require that all users have a secure password (consider the password work you undertook in part 1 of this module). Using the infographic above, discuss what penetration testing is. Include at least 4 threats that a system might face and what techniques could be undertaken to test the system.

  6. Network Forensics TASK! Create a job description for a network forensics specialist. In this description include at least 3 detailed areas where the person will need to lead activities. Upload this to Google Classroom Network forensics is used to gather and analyse data on a computer network. This can be for housekeeping eg to monitor system load at peak times or identify areas of the network where users may be dropping signal strength. The other major use of forensics is to monitor and prevent suspicious traffic. Large organizations have there own teams responsible for this. The police and security services may also monitor and analyse network traffic to catch criminal and terrorist activity

  7. Anti-malware software and Firewalls TASK! Research anti-malware software and firewalls. Create a list of at least 10 FAQs to be used by home-based networks For any system, whether it be at home, school or in a commercial organisation it is better to have security systems in place rather than using these after an attack. Two methods used are the application of firewalls and anti-malware software. In Part 1 you investigated what malware is. A firewall can be physical or software based. The best system will use both types to ensure that an attack does not occur. Attackers may look for vulnerable ports on a system that allow data in. Vulnerable ports may allow in SQL injections, malware to install or DDoS attacks. A firewall will check to see if particular sites are blocked and thereby disallow data from them, check data packets against known suspicious or dangerous patterns and generally monitor activity and report back or block.

  8. Encryption 1 Access the heilCeasar example in the Goggle Classroom. Run it and capture the output from at least two test runs. Explain how the code is producing the results • As we have seen in this module, system security is vital and one way to prevent problems occurring is to ensure that data cannot be read. The overall term for this is encryption. • All encryption means is to apply an algorithm to data so that it (the word means ‘secret writing”. • You have previously been introduced to the Caesar Cipher. You will know that this is an easy code to break. Once you know the key it can be applied to unlock a message. • HTTPS is a method of establishing encryption through SSL. The way that this works is as follows: • Satisfy the client machine that it is talking to the right server (and usually visa versa) • Agreement on a “cipher suite”, which includes which encryption algorithm they will use to exchange data • Agreement on any necessary keys for this algorithm In pairs, research types of encryption. Find at least 3 that are used in computer systems. Prepare a short presentation for delivery to the class The main point here is that algorithms are used to determine the type of encryption used.

  9. Encryption 2 A popular method of encryption is to use hashing algorithms (hashing is not always seen as a method of encryption as hashing is one way). In the Google Classroom find the file hashIt.txt and run it with password. Now paste the resulting 32 digit hex code into a browser window. What happens? Try the same process with a complex password (one containing capitals, punctuation and not a real name). How could the code be used given that there are many sites with databases of hash codes? Edit your code and replace .md5 with .sha224. What happens? Can your code be interpreted using online methods?

More Related