P3 Software and network security keeping systems and data secure and how data transmitted over a network can be protected by encryption.
These are measures taken within
the actual computers and not focusing on the building or surrounding area.
One of the ways to make sure the system is safe is to have passwords on everything, and very hard to guess passwords that have a mixture of upper and lower case, numbers, letters and punctuation. An incredibly insecure password would be 'password' or 'password1' however having 'pA$sw0Rd7' would be much more secure. It is a lot harder to remember however and having such difficult to remember passwords have led to employees writing their passwords down and leaving them on sticky notes right next to their computer, and if the building gets broken into then they automatically have access to everything. this is why it is vital that people remember their passwords and not write them down.
Virus checking software will often run in the background of any system. It will scan each file as it is being opened for any fingerprints which match the virus definitions. It will also attempt to identify any suspicious activity from a program. If a virus is detected then the antivirus software should take care of it before it can cause any problems. Software to detect and get rid of viruses is of massive importance as a virus can gain access to important information and could corrupt it.
Confidentiality is a very simple way to keep data secure however it would also be very easy for an employee for a high security company to mention something important about work in passing and for the wrong person to hear it. a lot of companies have policies stating that employees are not allowed to post about work, be it colleagues or bosses or actual work at all and this all leads to data being more confidential.
Keeping the operating system up to date is also very important as it usually has defects or bugs where viruses can easily slip through and when you update it is more than likely that they will have fixed the bug and patched up the holes.
One of the ways to make sure the system is safe is to have passwords on everything, and very hard to guess passwords that have a mixture of upper and lower case, numbers, letters and punctuation. An incredibly insecure password would be 'password' or 'password1' however having 'pA$sw0Rd7' would be much more secure. It is a lot harder to remember however and having such difficult to remember passwords have led to employees writing their passwords down and leaving them on sticky notes right next to their computer, and if the building gets broken into then they automatically have access to everything. this is why it is vital that people remember their passwords and not write them down.
Virus checking software will often run in the background of any system. It will scan each file as it is being opened for any fingerprints which match the virus definitions. It will also attempt to identify any suspicious activity from a program. If a virus is detected then the antivirus software should take care of it before it can cause any problems. Software to detect and get rid of viruses is of massive importance as a virus can gain access to important information and could corrupt it.
Confidentiality is a very simple way to keep data secure however it would also be very easy for an employee for a high security company to mention something important about work in passing and for the wrong person to hear it. a lot of companies have policies stating that employees are not allowed to post about work, be it colleagues or bosses or actual work at all and this all leads to data being more confidential.
Keeping the operating system up to date is also very important as it usually has defects or bugs where viruses can easily slip through and when you update it is more than likely that they will have fixed the bug and patched up the holes.
Encryption is a method of converting normal information such
as text, images and media into a format which is unintelligible unless you are
in possession of the key that is the basis of the conversion. Public/private
keys are keys that are mathematically related. The public key can be widely
distributed, among employees for example, and is used to encrypt data. The
private key can decrypt the data and is kept secret.
Handshaking
is process where two communication devices continuously agree a method of data
communication.
Use of backups is also extremely important in case the information gets corrupted or accidentally deleted. 2 copies of the backup should be taken, one to leave on the premises for easy access if information is needed quickly and one to be kept off the premises in case there is a fire or something similar which would mean both the original and the backup data would be destroyed. there are different types of backup and these are as follows;
Incremental Backups: Involves storing only changed data since the last backup of any type.
Differential Backups: Involves storing only changed data since the last full backup.
Redundancy: A term in meaning duplication of information.
RIAD: Stands for redundant array of independent disks. It is used as a live backup mechanism with multiple hard disks maintaining multiple images of the data.
Mirroring: A backup server that ‘mirrors’ the processes and actions of the primary server fails. If the primary server fails, the backup server can take over without any downtime because it has mirrored the content of the primary server.
The tiers of recovery show what how prepared a company would be if all their information was wiped. are as follows;
Use of backups is also extremely important in case the information gets corrupted or accidentally deleted. 2 copies of the backup should be taken, one to leave on the premises for easy access if information is needed quickly and one to be kept off the premises in case there is a fire or something similar which would mean both the original and the backup data would be destroyed. there are different types of backup and these are as follows;
Incremental Backups: Involves storing only changed data since the last backup of any type.
Differential Backups: Involves storing only changed data since the last full backup.
Redundancy: A term in meaning duplication of information.
RIAD: Stands for redundant array of independent disks. It is used as a live backup mechanism with multiple hard disks maintaining multiple images of the data.
Mirroring: A backup server that ‘mirrors’ the processes and actions of the primary server fails. If the primary server fails, the backup server can take over without any downtime because it has mirrored the content of the primary server.
The tiers of recovery show what how prepared a company would be if all their information was wiped. are as follows;
Tier 0 – No off site data. Possibly no recovery. One power
cut and all data is unsafe.
Tier 1 – Data backup with a no dark site. Backups are taken
but no replacement location if system fails.
Tier 2 – Data backup with a dark site. Copies of data are
taken and there is a centre available to transfer data.
Tier 3 – Electronic vaulting. Mirrored copies of the system
state are continuously maintained.
Tier 4 - Point-In-Time copies. Remote copies of the data are
the same as local data.
Tier 5 – Transaction integrity. The system ensures both
copies are in tune with each other.
Tier 6 – Zero data loss. For fast systems, where a sudden
fault, could result in some minor transactional data loss.
Tier 7 – Highly
automated, business integrated solution. The system will do all the thinking
for you.Call Backs are used on dial up systems where network administrators can dial into a network and the network device will call them back. Carries a username and password to ensure that the channel is secure. It uses CHAP which stands for Challenge handshake authentication protocol.
A diskless network is very useful as it does not have a CD/DVD drive, USB ports or floppy disk drive. It stops users adding new devices such as USB sticks or CDs so data is not being stolen and it also stops data being easily transferred from a computer to a mobile storage device.
A firewall acts as a barrier between the computer and the internet, having a firewall makes it extremely hard for hackers and viruses to get onto the system. Firewalls are usually meant to stop malicious things from coming in but they can also be set up to prevent employees accessing dangerous sites or sending out information over email.
Penis
ReplyDeletebro...
Delete