COMPUTER PLATFORMS - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

COMPUTER PLATFORMS

Description:

Essentially allowing ANYONE onto your computer or network ... Monitors network traffic for anything sinister. Flags unusual behaviour ... – PowerPoint PPT presentation

Number of Views:60
Avg rating:3.0/5.0
Slides: 18
Provided by: stuartcu
Category:

less

Transcript and Presenter's Notes

Title: COMPUTER PLATFORMS


1
COMPUTER PLATFORMS
Computer Network Security User Support
Training Week 11
2
Week 11
  • Security
  • Dangers
  • Attacks
  • Countermeasures
  • Rights
  • Users
  • Problems
  • Support
  • Training

3
Computer Security
  • Danger! Danger!
  • A variety of situations are dangerous to your
    computer or network
  • Standalone systems
  • Walk up access
  • Networked computers
  • Access to one system potentially allows access to
    entire network
  • Propagation of viruses
  • Remote access
  • The Internet
  • Essentially allowing ANYONE onto your computer or
    network
  • Viruses in email, downloaded by accident
  • Spam, pop-ups

4
Computer Security
  • Your data is important!
  • For whatever reason
  • Sensitive business data
  • Personal information
  • Financial information
  • Credit Cards
  • Address, telephone number
  • Research data
  • Information about other people
  • etc.
  • Plain invasion of privacy / theft
  • You dont want someone else getting hold of it!
  • You dont want someone corrupting your system or
    monitoring your activities

5
Computer Security
  • Attacks
  • Someone (or something) doing stuff to your
    system(s)
  • When they shouldnt be!
  • 3 things to worry about
  • Crackers / Intruders
  • Technically hacker is the wrong term
  • Attempt to break into your system
  • Access your data / steal stuff / exploit your
    machine
  • Viruses
  • Malicious programs
  • Very infectious
  • Uses the computers resources in some way
  • Worms
  • Self-replicating
  • Not normally malicious
  • Just irritating
  • Uses the computers resources in some way

6
Security Countermeasures
  • Physical
  • Keep machines under lock and key
  • Only give access to those who need it
  • Remove disk drives, access to ports
  • e.g- disable USB access
  • Nail down the machine - literally
  • Non-technical
  • Good, long passwords
  • jL04BMh as opposed to fred
  • Dont let software save your passwords / details
  • AutoComplete, Password Manager, etc.
  • Use an OS / NOS that supports good security
  • Especially when networking
  • E.g.- Windows 2000 / Linux
  • Keep OS up to date with patches/fixes
  • Install anti-virus software
  • Remember to log out

7
Security Countermeasures
  • Enforce log-on and passwords for all users

8
Security Countermeasures
  • Firewall
  • Restricts access to networks
  • Filters data packets
  • Intrusion Detection System (IDS)
  • Monitors network traffic for anything sinister
  • Flags unusual behaviour
  • Usually has the ability to block
  • Ports
  • Close all unused ports
  • Do not allow un-needed services
  • Authentication
  • Make sure you know who users are
  • Only allow authorised users access

9
Security Countermeasures
  • Encryption
  • Locking information by using a password or key
  • Hiding data
  • Secure communications
  • Information in transit can be encrypted
  • Must be decrypted at the other end
  • Security Policies
  • Rules that everyone must adhere to
  • Passwords
  • User names
  • Account / Group restrictions
  • Backup / Disaster Recovery
  • Doesnt prevent attack
  • Makes recovering easier

10
Security Rights
  • Set access rights and permissions for files,
    folders and resources
  • Users
  • Have to administer each user
  • Time intensive
  • Groups
  • Organise similar users into groups
  • E.g.- Sales
  • Administer group rather than user
  • Basic rights
  • Read, Write, Execute, List
  • In Windows NT, 2000, XP, 2003
  • Done using NTFS
  • New Technology File System
  • Also on MacOS, UNIX, Linux and Novell

11
Security Rights
  • Windows

12
Security Rights
  • Novell

13
Computer Rights
  • UNIX / Linux / MacOS

User / owner
Group
14
To err is human (even more so to blame it on
the computer)
  • It can only be attributable to human error?!
  • People make mistakes
  • Machines dont!
  • More and more computer illiterates are using
    computers!
  • Install bad software
  • Accidentally change config settings
  • Go to dodgy web sites
  • Things break / blow up / melt
  • We must be able to put right these problems

15
Methods of support
  • Support staff
  • Required to solve problems
  • Look after systems
  • IT Manager
  • Systems Administrator
  • Technician
  • Can be expensive to hire new staff
  • Provides on-site support
  • Training for existing staff
  • Attempt to solve the problem before it occurs
  • Stops staff breaking things
  • Allow staff to be able to solve basic problems
  • Investing in training brings greater return on
    technology implementation
  • Saves money in the long-term
  • Costs money initially

16
Methods of support
  • Support
  • Some form is technical support will be required
  • Insurance in case of technical failure
  • Especially with specialist equipment
  • Two main types
  • On site (in house) support
  • Involves employing one or more person(s)
  • 3rd Party support
  • Service Level Agreements
  • Can take time to solve a problem
  • Maintenance
  • Checks of equipment working order
  • Routine maintenance checks / tasks
  • Upgrading equipment and software
  • Keeping systems performance high
  • Continually updating any live services
  • Especially sales marketing

17
Week 11
  • Security
  • Dangers
  • Attacks
  • Countermeasures
  • Rights
  • Users
  • Problems
  • Support
  • Training
Write a Comment
User Comments (0)
About PowerShow.com