In the last 2 decades, theirs havebeen a rapid development in hardware and software in computer, phone ortablets. It has revolutionised the man kind which made us do and discoverthings which we could never imagined 10-20 years ago or maybe 5 years ago. As weare advancing in an uncontrollable speed, the treat to all the system are alsoincreasing rapidly. That why we need to make sure our system is treat free andour security measurements are strong to avoid any internal and external treats.For example, our government is more like a digital government as they areslowly moving everything online and let the public take control of their ownstuff.
This also increase the risk of the government position as we have seenin recent years like NHS dos attack and member of parliament email being hackand password being changed.Describe using examples how software and network security measures, toolsand techniques can keep systems and data secure. (Pass 3)FirewallsThese build a protective barrieraround the computers that are connected to a network, so that only authorizedprograms can access data on a particular workstation. The IT admin can controlexactly which software is allowed to pass data in and out of the system. For example,automatic updates might be allowed for some installed software.BackupsWe must regularly backups theinformation in case of physical or processing problems. This may be a fullbackup of all information or partial backup of just information that haschanged since the last full backup.
This helps because it means if somethinggoes wrong, none of the student’s work is lost or their information is lost.Virus ProtectionPCs can be attacked by viruses,worms and Trojans arriving with email during access to the internet. Anti-Virussoftware checks for intruders.
It attempts to trace viruses by spotting thevirus signature. As this happens people who code the virus will adopt cloakingtechniques such as poly-morphing. Almost as soon as virus coders invent new viruses,anti-virus software vendors produce updated version of their software. Theanti-virus software vendors maintain a database of information about viruses,their profile and signatures.Encryption of the NetworkPublic and Private key (Part of encryption) There is a security certificateissued by a public website.
The certificate is a public key. Then what happensis that this exchange creates a private key. The private key is 1024-bit value(this is a massive number), then the protocol exchanges the numbers giving alarge calculation that only the two in the exchange will know. There is also ahash which is generated from the results of each calculation as part of eachprivate key generation. Audit logThis is used to keep a record ofnetwork database activity, recording who has done what, where they did it andwhen. The majority of databases and network activities will go unnoticed, butthe purpose of the audit log is, to maintain a detailed record of how anysystem has been used, on recognition of an issue.
PasswordsThe management of passwords isessential. In a school like BISH password are very important as they keepimportant data secure. To make sure the password is safe and secure, it shouldbe at least 8 characters long which both numbers and letters, one which iscomplete and utter nonsense and to change their password at least every 90days.
HandshakingThis happens on a WAN (Wide areanetwork). The process of handshaking, is that data can be sent using a publicworkstation which may not be trusted so to improve this each device has tocomplete a challenge. This can be random but can carry a remote user name andpassword. Diskless networksOn each workstation at BISH theBIOS allows the workstation to boot from, CD, Network or Hard drive. Indiskless networks workstations do not allow any drives to be used which stopsusers to adding new devices.