1 / 13

Unit 32 – Networked Systems Security

Explore network attacks, types of threats, and mitigation strategies in this comprehensive guide on networked systems security. Understand the history, types, and impact of network attacks alongside practical ways to enhance network security.

nettiec
Download Presentation

Unit 32 – Networked Systems Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Unit 32 – Networked Systems Security https://www.tes.com/lessons/k-4i3DlopqkOYA/review-week-unit-32-networked-systems-security

  2. Find different network attacks Learning Objective 2

  3. A group of interconnected (via cable and/or wireless) computers and peripherals that is capable of sharing software and hardware resources between many users. The Internet is a global network of networks. What is a Network?

  4. Network security is the process by which digital information are protected What is Network Security?

  5. The term ‘computer virus' was formally defined by Fred Cohen in 1983, while he performed academic experiments on a Digital Equipment Corporation VAX system. • Viruses are classified as being one of two types: research or ‘in the wild.' A little history

  6. The first computer viruses were developed in the early 1980s. • The first viruses found in the wild were Apple II viruses, such as Elk Cloner, which was reported in 1981 A little history

  7. Create an a-z of network attacks poster (pairs). See if you can find 26 different attacks! Organise the attacks into highest to lowest impact the attack has on a network Task

  8. Define network attacks Learning Objective 3

  9. Denial of service • Back door • Spoofing • Mathematical • Brute force • Adware. • Software exploitation • Viruses • Rootkits • Worms • Trojans • Spyware Attacks

  10. There are many different types of network attacks, for the following: research online and define the type of attack. In pairs, create a presentation that defines the following: • denial of service, • back door, • spoofing, • mathematical, • brute force, • adware. Your definition should be no more than 1 sentence/20 words. • software exploitation, • viruses, • rootkits, • worms, • Trojans, • spyware, Task Research into the most prolific malware / attacks which were written by teenagers! Write some information down about them – Name of attack/malware, data, damage caused (cost) etc. Present - presentation, report

  11. Summarise a network attack Learning Objective 4

  12. Choose 3 types of threats that attack a network, summarise each attack. • Why is it a dangerous type of attack? • When is a company usually susceptible to this type of attack? • Who normally perpetrates this type of attack? • Include a diagram of this attack (if possible) Task Recommend ways the attack can be mitigated

  13. Read this http://www.securityweek.com/virus-threats is there anything interesting? Homework

More Related