1 / 17

COMPUTER PLATFORMS

Computer & Network Security & User Support & Training Week 11. COMPUTER PLATFORMS. Week 11. Security Dangers Attacks Countermeasures Rights Users Problems Support Training. Computer Security. Danger! Danger! A variety of situations are dangerous to your computer or network

kylie-garza
Download Presentation

COMPUTER PLATFORMS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer & Network Security & User Support & Training Week 11 COMPUTER PLATFORMS Stuart Cunningham - Computer Platforms - 2003

  2. Week 11 • Security • Dangers • Attacks • Countermeasures • Rights • Users • Problems • Support • Training Stuart Cunningham - Computer Platforms - 2003

  3. Computer Security • Danger! Danger! • A variety of situations are dangerous to your computer or network • Standalone systems • ‘Walk up’ access • Networked computers • Access to one system potentially allows access to entire network • Propagation of viruses • Remote access • The Internet • Essentially allowing ANYONE onto your computer or network • Viruses in email, downloaded by accident • Spam, pop-ups Stuart Cunningham - Computer Platforms - 2003

  4. Computer Security • Your data is important! • For whatever reason • Sensitive business data • Personal information • Financial information • Credit Cards • Address, telephone number • Research data • Information about other people • etc. • Plain invasion of privacy / theft • You don’t want someone else getting hold of it! • You don’t want someone corrupting your system or monitoring your activities Stuart Cunningham - Computer Platforms - 2003

  5. Computer Security • Attacks • Someone (or something) doing stuff to your system(s) • When they shouldn’t be! • 3 things to worry about • Crackers / Intruders • Technically “hacker” is the wrong term • Attempt to break into your system • Access your data / steal stuff / exploit your machine • Viruses • Malicious programs • Very infectious • Uses the computers resources in some way • Worms • Self-replicating • Not normally malicious • Just irritating • Uses the computers resources in some way Stuart Cunningham - Computer Platforms - 2003

  6. Security Countermeasures • Physical • Keep machines under lock and key • Only give access to those who need it • Remove disk drives, access to ports • e.g- disable USB access • Nail down the machine - literally • Non-technical • Good, long passwords • ‘jL04BM£h&~’ as opposed to ‘fred’ • Don’t let software save your passwords / details • ‘AutoComplete’, ‘Password Manager’, etc. • Use an OS / NOS that supports good security • Especially when networking • E.g.- Windows 2000 / Linux • Keep OS up to date with patches/fixes • Install anti-virus software • Remember to log out Stuart Cunningham - Computer Platforms - 2003

  7. Security Countermeasures • Enforce log-on and passwords for all users Stuart Cunningham - Computer Platforms - 2003

  8. Security Countermeasures • Firewall • Restricts access to networks • Filters data packets • Intrusion Detection System (IDS) • Monitors network traffic for anything sinister • Flags unusual behaviour • Usually has the ability to block • Ports • Close all unused ports • Do not allow un-needed services • Authentication • Make sure you know who users are • Only allow authorised users access Stuart Cunningham - Computer Platforms - 2003

  9. Security Countermeasures • Encryption • Locking information by using a password or key • Hiding data • Secure communications • Information in transit can be encrypted • Must be decrypted at the other end • Security Policies • Rules that everyone must adhere to • Passwords • User names • Account / Group restrictions • Backup / Disaster Recovery • Doesn’t prevent attack • Makes recovering easier Stuart Cunningham - Computer Platforms - 2003

  10. Security Rights • Set access rights and permissions for files, folders and resources • Users • Have to administer each user • Time intensive • Groups • Organise similar users into groups • E.g.- ‘Sales’ • Administer group rather than user • Basic rights: • Read, Write, Execute, List • In Windows NT, 2000, XP, 2003 • Done using NTFS • ‘New Technology’ File System • Also on MacOS, UNIX, Linux and Novell Stuart Cunningham - Computer Platforms - 2003

  11. Security Rights • Windows Stuart Cunningham - Computer Platforms - 2003

  12. Security Rights • Novell Stuart Cunningham - Computer Platforms - 2003

  13. - rw- r-- r-- user adm 120 Jan 21 mdt.tex d rw- r-- rwx root root 1024 Feb 6 local World Group Owner Computer Rights • UNIX / Linux / MacOS User / owner Group Stuart Cunningham - Computer Platforms - 2003

  14. To err is human… (even more so to blame it on the computer) • It can only be attributable to human error?! • People make mistakes • Machines don’t! • More and more computer illiterates are using computers! • Install bad software • Accidentally change config settings • Go to dodgy web sites • Things break / blow up / melt • We must be able to put right these problems… Stuart Cunningham - Computer Platforms - 2003

  15. Methods of support • Support staff • Required to solve problems • Look after systems • IT Manager • Systems Administrator • Technician • Can be expensive to hire new staff • Provides ‘on-site’ support • Training for existing staff • Attempt to solve the problem before it occurs • Stops staff breaking things • Allow staff to be able to solve basic problems • Investing in training brings greater return on technology implementation • Saves money in the long-term • Costs money initially Stuart Cunningham - Computer Platforms - 2003

  16. Methods of support • Support • Some form is technical support will be required • ‘Insurance’ in case of technical failure • Especially with specialist equipment • Two main types: • On site (in house) support • Involves employing one or more person(s) • 3rd Party support • Service Level Agreements • Can take time to solve a problem • Maintenance • Checks of equipment working order • Routine maintenance checks / tasks • Upgrading equipment and software • Keeping systems performance high • Continually updating any ‘live’ services • Especially sales & marketing Stuart Cunningham - Computer Platforms - 2003

  17. Week 11 • Security • Dangers • Attacks • Countermeasures • Rights • Users • Problems • Support • Training Stuart Cunningham - Computer Platforms - 2003

More Related