Network Security
Computer networks have a lot of advantages but create security risks because people share a lot of personal data easily.
Network Managers are employed to manage the security of their networks and avoid any problems.
Network Managers are employed to manage the security of their networks and avoid any problems.
Anti-Virus Software
Malicious software can cause damage to computers. Many forms exist: Viruses,Worms,Zombies,Trojans and Spybots.
- Anti-Virus software is used to block attacks from those malwares. Some Operating systems use their own inbuilt anti-virus software.
In a large organization, a network manager will make sure all computers are up to date with their anti-virus software and that all computers are secure.
- Anti-Virus software is used to block attacks from those malwares. Some Operating systems use their own inbuilt anti-virus software.
In a large organization, a network manager will make sure all computers are up to date with their anti-virus software and that all computers are secure.
Firewalls
Software which blocks unexpected connections coming into the network. Most OS include a firewall
When more than one person uses a network, IDs and password have to be used. Only someone who knows their login and password can access the network. It also helps network managers to trace suspicious activity to a user.
A weak password can be decrypted easily, so a good password should have a mix of Upper-case and lower-case letters and numbers.
A weak password can be decrypted easily, so a good password should have a mix of Upper-case and lower-case letters and numbers.
Access levels
In a large organization, the network manager will control the level of access users have to the network.
- General users won't have the ability to download any software or make changes to the system which can affect other users
- The more people have access to sensitive parts of the network, the more likely it is that a hacker or virus might cause damage
- Access levels can be setup on your own computer at home
- General users won't have the ability to download any software or make changes to the system which can affect other users
- The more people have access to sensitive parts of the network, the more likely it is that a hacker or virus might cause damage
- Access levels can be setup on your own computer at home
Encryption
Any message sent over a network can be intercepted so Encryption (method of changing the original data to be disguised) is used especially if you send sensitive information.
- Ceasar Cipher algorithm can be used (A->B)(B->C)
websites with prefix https indicate that it is a secure website and any payment or personal details that are input will be encrypted.
- Ceasar Cipher algorithm can be used (A->B)(B->C)
websites with prefix https indicate that it is a secure website and any payment or personal details that are input will be encrypted.
Network Policies
Provide rules and guidelines on what network users can and cannot do.
Acceptable Use Policy
AUP states how the network may be used, what is and is not acceptable. Guidelines users have to accept.
Archiving
Networks store a lot of data so archiving is done when non-essential data is put somewhere safe. Archiving policy is used to decide when to move, where to be kept and to get the data back if needed.
Acceptable Use Policy
AUP states how the network may be used, what is and is not acceptable. Guidelines users have to accept.
Archiving
Networks store a lot of data so archiving is done when non-essential data is put somewhere safe. Archiving policy is used to decide when to move, where to be kept and to get the data back if needed.
Network Security Failures
Security measures need to be high for companies that use networking technology.
Cyber attacks
Cyber attacks and cyber terrorism are ways to attack companies and organisations. There are frequent attacks on the govt and businesses in the UK
Hacking
Hackers attempt to break into networks. IT security specialists are employed to find security weaknesses ("white hat hackers"), they are experts in their field and have knowledge of the latest techniques being used by illegal hackers.
Cyber attacks
Cyber attacks and cyber terrorism are ways to attack companies and organisations. There are frequent attacks on the govt and businesses in the UK
Hacking
Hackers attempt to break into networks. IT security specialists are employed to find security weaknesses ("white hat hackers"), they are experts in their field and have knowledge of the latest techniques being used by illegal hackers.
Phishing & Farming
Phishing
Phishing is when a user inputs their personal data into fake websites in order to steal their information. (fake swisscom website)
Pharming
Pharming: Changes the user's request DNS to redirect the user to a fake website.
Phishing is when a user inputs their personal data into fake websites in order to steal their information. (fake swisscom website)
Pharming
Pharming: Changes the user's request DNS to redirect the user to a fake website.