describe how software and network security can keep systems and data secure p3. m2 and d1 unit 7
TRANSCRIPT
Assessment Criteria
P3 – Describe how software and network security can keep systems and data secure
M2 – Explain the operation and use of an encryption technique in ensuring security of transmitted data
Discuss different ways of recovering from a disaster
Network and software security
Encryption Techniques –
Cipher encryption which is no longer used,
RSA encryption – public/ private key
WEP for wireless access points
WAN connections for routing protocols
Call Back
Used in dial up systems where network administrators can dial ino a network and the device will call them back. This can only be done from a trusted registered line not any location
Diskless Networks
CD/DVD Drives or USB drives are allowed. They will not have any CD drives on desktops and permissions will mean that these drives even if available cannot be used.
Backups
Ensuring that backup procedures are in place to ensure that data can be restored if anything goes wrong
Incremental backups
Differential backups
Fire Safe back up
Full back ups
Archive Backups
Raid backups which have a real time mirror image so that they can be restored without redundancy
Audit Logs
This logs network and database activity
If there is an issue administrators can look through the logs to help them find the problem
Works with monitoring systems which enable alarms to be place on a system, alerting system administrators to potential suspicious activity e.g. Syslog
Firewall Configurations
This blocks unwanted traffic from organisations
Explain difference between internal and external systems
Explain NAT
UDP Ports and TCP Ports
Intrusion Detection Systems
These will look for attacks on the network from hackers and tools they may use
Some will be passive and record attempts and then be reviewed by admin controller
Some will be reactive and reconfigure the firewall to block the intrusion
Explain Access Control Lists ACL’s and Routing Protocols
Disaster Recover
Disaster Recovery
Backups Systems
Whole System replacement very rare
Tiers of Recovery
Merit
Explain in detail how RSA encryption works
Use this website to help you
http://searchsecurity.techtarget.com/definition/RSA