Network security
Fire walls
- Can stop hackers from getting onto our network.
- This is usually a program installed on a network. It filters the data coming through the internet connection.
- Anyone outside the network will not be able to access the network.
Authentication techniques
- These are used to check that a person accessing a network or system is genuinely the person in question.
Some techniques
- Username and passwords(supply both use both to get full marks )
- Digital signatures
- Biometrics (finger print )
- Magnetic stripe card / id card /Pin numbers
What is a username and why must it be unique?
So nobody else can log on part from you
What is a password?
A password is a string of characters (letters, numbers and punctuation marks)
Only the user will know what the password is
4 characteristics of a password
- Do not use a word that can be found in a dictionary
- Do not use your own or any other name or surname even if you put numbers after it
- Always use the maximum number of characters the system allows .so, if the password can be up to 10 characters, use all 10 and just say 4 of them
- Include numerals as well as letters
3 things to consider
- So not write your passwords down
- Change your password regularly
- Do not tell anyone your password
Fire walls
- Can stop hackers from getting onto our network.
- This is usually a program installed on a network. It filters the data coming through the internet connection.
- Anyone outside the network will not be able to access the network.
Authentication techniques
- These are used to check that a person accessing a network or system is genuinely the person in question.
Some techniques
- Username and passwords(supply both use both to get full marks )
- Digital signatures
- Biometrics (finger print )
- Magnetic stripe card / id card /Pin numbers
What is a username and why must it be unique?
So nobody else can log on part from you
What is a password?
A password is a string of characters (letters, numbers and punctuation marks)
Only the user will know what the password is
4 characteristics of a password
- Do not use a word that can be found in a dictionary
- Do not use your own or any other name or surname even if you put numbers after it
- Always use the maximum number of characters the system allows .so, if the password can be up to 10 characters, use all 10 and just say 4 of them
- Include numerals as well as letters
3 things to consider
- So not write your passwords down
- Change your password regularly
- Do not tell anyone your password
To avoid password interception
- Change password regularly
- ANTI-SPYWARE software can be installed on a network to HELP PROTECT COMPUTERS against pop-ups, slow performance and security threats caused by spyware and other unwanted software
- SPYWARE is software that can COLLECT AND RELAY PESONAL INFORMATION WITHOUT YOUR KNOWLEDGE. E.g., a key-logger can record and send all keystrokes made on your computer
- Change password regularly
- ANTI-SPYWARE software can be installed on a network to HELP PROTECT COMPUTERS against pop-ups, slow performance and security threats caused by spyware and other unwanted software
- SPYWARE is software that can COLLECT AND RELAY PESONAL INFORMATION WITHOUT YOUR KNOWLEDGE. E.g., a key-logger can record and send all keystrokes made on your computer
how does biometrics work?
biometrics use features of the human body that are unique to a particular person.usually this is a persons fingerprint or the pattern of the eye (called the retina).automatically identifies their unique finger print and allows them to access to the network and the resources they are allowed.
biometrics use features of the human body that are unique to a particular person.usually this is a persons fingerprint or the pattern of the eye (called the retina).automatically identifies their unique finger print and allows them to access to the network and the resources they are allowed.
3 example of a biometric
- fingerprint
- eye
- DNA
- fingerprint
- eye
- DNA
what is a virus
a piece of PROGRAMMING CODE/SOFTWARE which copies itself from one computer to anther
how it spreads
it does this by attaching iself to files and is transferred via email, programs/files/images downloaded from the internet or portable media - USBs etc
prevention
INSTALL ANTI-VIRUS SOFTWARE to detect viruses and limit their damage by removing them.
the software tries to detect viruses before they can get access to your computer
regularly UPDATE ANTIVIRUS SOFTWARE.
only use storage media from know sources
a piece of PROGRAMMING CODE/SOFTWARE which copies itself from one computer to anther
how it spreads
it does this by attaching iself to files and is transferred via email, programs/files/images downloaded from the internet or portable media - USBs etc
prevention
INSTALL ANTI-VIRUS SOFTWARE to detect viruses and limit their damage by removing them.
the software tries to detect viruses before they can get access to your computer
regularly UPDATE ANTIVIRUS SOFTWARE.
only use storage media from know sources