Network Security

Descripción

Year 10 Computing Mapa Mental sobre Network Security, creado por Gurleen Bansal el 20/09/2018.
Gurleen Bansal
Mapa Mental por Gurleen Bansal, actualizado hace más de 1 año
Gurleen Bansal
Creado por Gurleen Bansal hace más de 6 años
12
0

Resumen del Recurso

Network Security

Adjunto:

  1. Reasons for Network Security
    1. Ensures only authorised users can access certain files and resouces
      1. Prevents misuse e.g. deleting information or installing data
        1. Prevents damage to hardware
        2. Importance of Network Security
          1. Business may fail if the data is compromised
            1. Privacy e.g. medical records
              1. Data can be financially valuable
              2. Authentication and Validation
                1. Authentication is used to ensure that the person logging on is who they claim to be
                  1. This is done by the use of usernames and passwords
                    1. Strong passwords should include at least 8 characters and a variety of upper-case, lower-case, numbers, symbols
                    2. Access control
                      1. Used to allow certain users to access certain files and data
                      2. Physical Security
                        1. This is used a first line of defence; stopping unauthorised people from entering the building where the network equipment is
                          1. Examples include locks, biometric security recognition, swipe cards, cameras, alarms, radio frequency identification (an alarm will sound if the equipment is taken out of the building)
                          2. Firewalls
                            1. A firewall protects a network connected to a WAN e.g. the Internet
                              1. It can be provided by hardware or software
                                1. Firewalls can be made to prevent communications entering the network but can also prevent programs and users from accessing the internet from within the network
                                Mostrar resumen completo Ocultar resumen completo

                                Similar

                                Types and Components of Computer Systems
                                Jess Peason
                                Input Devices
                                Jess Peason
                                Output Devices
                                Jess Peason
                                Computing
                                Kwame Oteng-Adusei
                                Pack of playing cards answer
                                Karl Taylor
                                Code Challenge Flow Chart
                                Charlotte Hilton
                                CCNA Security 210-260 IINS - Exam 1
                                Mike M
                                CCNA Security 210-260 IINS - Exam 2
                                Mike M
                                Computing Hardware - CPU and Memory
                                ollietablet123
                                Computer Systems
                                lisawinkler10
                                Computer science quiz
                                Ryan Barton