Network Security

Description

A Level ICT (Unit 3.2) Mind Map on Network Security, created by scott.dowle on 27/05/2013.
scott.dowle
Mind Map by scott.dowle, updated more than 1 year ago
scott.dowle
Created by scott.dowle over 11 years ago
49
0

Resource summary

Network Security
  1. When using a standalone computer security is fairly straight forward
    1. Password, keyboard lock, screensaver etc
      1. When part of a network it is more complex
      2. Large Number of workstations gives greater risk of abuse, particularly if network can be remotely accessed
        1. Illegal access to the network could be catastrophic for the company
          1. Corporate security is required at appropriate level with a disciplinary procedure to back it up
            1. Viruses and illegal software spread faster over a network especially if all machines have DVD drives, USB ports, internet access and email
              1. Preserving Security
                1. Physical Controls
                  1. Limit access to equipment
                    1. restrict unauthorised personnel
                    2. Software
                      1. Restrict access to resources
                        1. Assign read only access/ read/edit or read/ write/ delete/ edit
                        2. Username and Password
                          1. Allocated so others cannot access their files
                            1. Avoid use of obvious options
                          2. Protecting Networks against Illegal Access
                            1. Firewall
                              1. Only authorised data passes in and out through it
                                1. Stops access of incoming viruses
                                2. Data Encryption
                                  1. Scrambling or coding data
                                    1. Only visable to people authorised to see it and have the key
                                      1. Ensures data is useful to anyone unauthorised to see it
                                    Show full summary Hide full summary

                                    Similar

                                    Types and Components of Computer Systems
                                    Jess Peason
                                    Input Devices
                                    Jess Peason
                                    Output Devices
                                    Jess Peason
                                    Networks
                                    Will8324
                                    General ICT Quiz
                                    leahshaw
                                    ICT Revison Flash Cards
                                    Arun Johal
                                    FLAT FILE VS RELATIONAL DATABASE
                                    rosiejones
                                    Online World - Learning Aim A
                                    andysedge
                                    Business Aims and ICT Strategies
                                    scrt
                                    User Interfaces
                                    Skeletor
                                    General ICT Quiz
                                    Jade Fantom