70 likes | 208 Views
Network Security. Accidental threats: Hard go guard against, eg. accidently delete files, lost memory sticks. Deliberate threats: Hacker, person deliberately breaking into a computer network
E N D
Network Security • Accidental threats: • Hard go guard against, eg. accidently delete files, lost memory sticks. • Deliberate threats: • Hacker, person deliberately breaking into a computer network • Malware, programs designed to infiltrate and cause harm to a computer or network, eg. spyware, worms, keyloggers, etc. • Virus, program destroying files and alter performance of operating system • 3 Power surge, causing a spike resulting in loss
Network Security • File server failure can severely affect network users. • Server security: • Locked in air-conditioned, alarmed room with barred windows, restricted keys • No user access to server • Uninterruptible power supply (UPS) protects against blackouts, brownouts and voltage spikes. • Accessible fire fighting equipment.
Network Security • Usernames & passwords • Passwords are not strong protection – they can be guessed, forgotten or stolen. • Characteristics of good passwords; minimum 8 characters, mixed case, combination of letters, digits,
Network Security - Firewall • Server & software combination filtering data through an internet connection into an organisation’s internal network • Use of filters to examine information • Blocking access to certain domain names • Banning certain protocols from accessing servers • Words and phrases included in packets of information • Firewalls use two separate NICs
Network Security • Wireless security: • WAP should be configured so that it does not broadcast a network name • Use Wi-Fi Protected Access to encrypt data as it travels across wireless networks • To secure your network: • Malware protection • Virus protection software • Firewall
Encryption • Makes data unreadable to unauthorised people even if a file is stolen. • Used on sensitive files on networks (e.g. password lists and secret documents) • Web browsers use encryption to connect to a “Secure” SSL (Secure Socket Layers) site. • Some people encrypt email • WEP, for wireless LANs