Zusammenfassung der Ressource
Network Security
- When using a standalone
computer security is fairly
straight forward
- Password, keyboard lock, screensaver etc
- When part of a network it
is more complex
- Large Number of
workstations gives greater
risk of abuse, particularly if
network can be remotely
accessed
- Illegal access to the network
could be catastrophic for the
company
- Corporate security is
required at appropriate
level with a disciplinary
procedure to back it up
- Viruses and illegal software
spread faster over a network
especially if all machines have DVD
drives, USB ports, internet access
and email
- Preserving Security
- Physical Controls
- Limit access to equipment
- restrict unauthorised
personnel
- Software
- Restrict access to resources
- Assign read only access/ read/edit
or read/ write/ delete/ edit
- Username and Password
- Allocated so others cannot access their files
- Avoid use of obvious options
- Protecting Networks against Illegal Access
- Firewall
- Only authorised data
passes in and out through it
- Stops access of incoming viruses
- Data Encryption
- Scrambling or coding data
- Only visable to
people authorised to
see it and have the
key
- Ensures data is useful to
anyone unauthorised to
see it