A2 Level ICT - PowerPoint PPT Presentation

1 / 24
About This Presentation
Title:

A2 Level ICT

Description:

Understand the particular security, audit & accounting problems associated with ... Less control over the interface inability to customise ... – PowerPoint PPT presentation

Number of Views:17
Avg rating:3.0/5.0
Slides: 25
Provided by: steve232
Category:
Tags: ict | customise | level

less

Transcript and Presenter's Notes

Title: A2 Level ICT


1
A2 Level ICT
  • 14.5 - Networks

2
Understand the particular security, audit
accounting problems associated with networks
recall the steps, which can be taken to preserve
securityUnderstand the reasons for using
accounting software in providing a network
service
3
Problems with using a network
  • Risk of unauthorised access meaning potentially
    sensitive/confidential information may be
    accessible
  • Risk of viruses all nodes need to have up to
    date anti-virus software
  • Reliance on external agencies telecoms n/w that
    the company has little/no control over

4
Problems with using a network
  • More vulnerable to spurious data if incorrect
    data is entered into the system, the mistake may
    not be picked up for a long time
  • More difficult to backup as there will be no
    one centralised control
  • Increased management overhead - means that more
    time/money/manpower will need to be dedicated to
    the computer systems

5
Accounting Log
  • Record of facilities used - processor time
  • Number of pages printed
  • Disk space used
  • System failure crash details
  • File details for storage, update deleted
  • E-mail storage usage
  • Duration time of login

6
Accounting Log
  • User ID
  • Network address/station address
  • Failed logon attempts
  • Licenses used
  • Network traffic
  • Failed logins

7
Why is the accounting log important?
  • Provides system administration evidence of
    network workload
  • Allows administrators to deal with network
    performance problems
  • Allow for sensible distribution of system
    resources
  • Limit scarce resources - where required
  • Administer a charging system

8
Why is the accounting log important?
  • Make informed decisions about upgrades system
    enhancements
  • Deal with network misuse
  • Monitor software licenses
  • Memory/storage utilisation
  • Control network abuse
  • Administrator identify support novice users

9
Measures to combat Intranet network problems
  • Provide user login and password to make it more
    difficult to enter the system if not authorised
  • Set up required procedures so that users know
    the tasks that need to be carried out to maintain
    system security/integrity
  • Invest in redundant systems for mission critical
    applications so that if disaster hits,
    essential business functions can still be carried
    out

10
Measures to combat Intranet network problems
  • Ensure validation/verification checks are made on
    data
  • Encryption of data so that intercepted
    data/packets cannot be understood
  • Use up to data anti-virus software
  • Use a firewall to provide a filter on traffic
    coming in/going out

11
Preserving Network Security
  • Assign access rights to different users -
    read/write access, read-only, input/edit update
    capability, summary reporting, queries system
    administration
  • Control physical access to hardware - banks
    system for assigning PINs
  • Control sensitive applications to certain
    terminals
  • Codes of practice
  • Train staff to be aware of security issues
    procedures
  • Security procedures already in place
  • Audit of security procedures

12
Preserving Network Security
  • Auto-log off
  • Control access to hardcopies/printouts
  • Create a login ID or password to identify user
  • Force change of passwords on a timed basis
  • Create hierarchy of password giving different
    access rights
  • Set an accounting log to track misuse/inappropriat
    e transactions
  • Allocation of network address to workstation
  • Firewall
  • Controlled access to peripherals

13
Describe the measures taken to protect network
traffic against illegal access
14
Network Protection
  • Never give your password to anyone
  • Never write your password down
  • Never let anyone stand behind you when you key in
    your password
  • Never e-mail your password to anyone

15
Network Protection
  • Never use a password that can be found in a
    dictionary
  • Change your password on a regular basis
  • Never use your user id as a password
  • Do not choose a password that relates to you as
    an individual nickname
  • Use encryption facilities when sending sensitive
    data

16
Understand the reasons for using audit software
in providing a network service
17
Audit Software
  • Audit software is usually standalone meaning
    that it runs independently from the software it
    is monitoring/testing
  • It is designed to supply test data, which is then
    processed according to the application software
    being run
  • This tests the effectiveness of the applications
    software internal controls can be assessed in
    this way
  • Audit software can also monitor system misuse
  • The use of an accounting log can allow technical
    support the opportunity to back track, using the
    accounting log to trace any misuse

18
Understand how a network environment affects the
user interface provided, e.g. security, control
of software, control of files, access rights
19
Security of the system
  • Need to login to the system puts more dialogue
    inn place before accessing the system proper

20
Control of software used
  • Only allow the licensed number of concurrent
    copies to run at any one time
  • So users may not access software on demand
  • Time restrictions on access to software
  • So that users are only allowed to use certain
    software at designated times

21
Control of files used
  • Locking of files so that integrity of data is
    preserved
  • Users are aware of others accessing the files
  • Ability to provide files that cannot be altered
    by users

22
Access rights to resources
  • Users can only print to certain printers
  • So that users in different areas see different
    printers
  • Users can only see network drives relevant to
    their needs e.g. administrators see all resources
  • Access rights update, delete, edit, print, read
    only, read/write

23
Networked v. Standalone
  • Login screen user has one more stage to
    complete before they are able to use their system
  • More disk drives in screen user now has access
    to drives that are logical rather than physical
  • Less control over data user may now find that
    they have changed/no right to access files they
    could previously

24
Networked v. Standalone
  • Physical appearance of workstation/environment
    extra ports on machine/extra cable connected to
    machine/ability to print to other machines/extra
    hardware in the form of hubs
  • Access to remote/shared resources
  • Less control over the interface inability to
    customise
  • Increased communication using/via the machine
Write a Comment
User Comments (0)
About PowerShow.com