Title: A2 Level ICT
1A2 Level ICT
2Understand the particular security, audit
accounting problems associated with networks
recall the steps, which can be taken to preserve
securityUnderstand the reasons for using
accounting software in providing a network
service
3Problems with using a network
- Risk of unauthorised access meaning potentially
sensitive/confidential information may be
accessible - Risk of viruses all nodes need to have up to
date anti-virus software - Reliance on external agencies telecoms n/w that
the company has little/no control over
4Problems with using a network
- More vulnerable to spurious data if incorrect
data is entered into the system, the mistake may
not be picked up for a long time - More difficult to backup as there will be no
one centralised control - Increased management overhead - means that more
time/money/manpower will need to be dedicated to
the computer systems
5Accounting Log
- Record of facilities used - processor time
- Number of pages printed
- Disk space used
- System failure crash details
- File details for storage, update deleted
- E-mail storage usage
- Duration time of login
6Accounting Log
- User ID
- Network address/station address
- Failed logon attempts
- Licenses used
- Network traffic
- Failed logins
7Why is the accounting log important?
- Provides system administration evidence of
network workload - Allows administrators to deal with network
performance problems - Allow for sensible distribution of system
resources - Limit scarce resources - where required
- Administer a charging system
8Why is the accounting log important?
- Make informed decisions about upgrades system
enhancements - Deal with network misuse
- Monitor software licenses
- Memory/storage utilisation
- Control network abuse
- Administrator identify support novice users
9Measures to combat Intranet network problems
- Provide user login and password to make it more
difficult to enter the system if not authorised - Set up required procedures so that users know
the tasks that need to be carried out to maintain
system security/integrity - Invest in redundant systems for mission critical
applications so that if disaster hits,
essential business functions can still be carried
out
10Measures to combat Intranet network problems
- Ensure validation/verification checks are made on
data - Encryption of data so that intercepted
data/packets cannot be understood - Use up to data anti-virus software
- Use a firewall to provide a filter on traffic
coming in/going out
11Preserving Network Security
- Assign access rights to different users -
read/write access, read-only, input/edit update
capability, summary reporting, queries system
administration - Control physical access to hardware - banks
system for assigning PINs - Control sensitive applications to certain
terminals - Codes of practice
- Train staff to be aware of security issues
procedures - Security procedures already in place
- Audit of security procedures
12Preserving Network Security
- Auto-log off
- Control access to hardcopies/printouts
- Create a login ID or password to identify user
- Force change of passwords on a timed basis
- Create hierarchy of password giving different
access rights - Set an accounting log to track misuse/inappropriat
e transactions - Allocation of network address to workstation
- Firewall
- Controlled access to peripherals
13Describe the measures taken to protect network
traffic against illegal access
14Network Protection
- Never give your password to anyone
- Never write your password down
- Never let anyone stand behind you when you key in
your password - Never e-mail your password to anyone
15Network Protection
- Never use a password that can be found in a
dictionary - Change your password on a regular basis
- Never use your user id as a password
- Do not choose a password that relates to you as
an individual nickname - Use encryption facilities when sending sensitive
data
16Understand the reasons for using audit software
in providing a network service
17Audit Software
- Audit software is usually standalone meaning
that it runs independently from the software it
is monitoring/testing - It is designed to supply test data, which is then
processed according to the application software
being run - This tests the effectiveness of the applications
software internal controls can be assessed in
this way - Audit software can also monitor system misuse
- The use of an accounting log can allow technical
support the opportunity to back track, using the
accounting log to trace any misuse
18Understand how a network environment affects the
user interface provided, e.g. security, control
of software, control of files, access rights
19Security of the system
- Need to login to the system puts more dialogue
inn place before accessing the system proper
20Control of software used
- Only allow the licensed number of concurrent
copies to run at any one time - So users may not access software on demand
- Time restrictions on access to software
- So that users are only allowed to use certain
software at designated times
21Control of files used
- Locking of files so that integrity of data is
preserved - Users are aware of others accessing the files
- Ability to provide files that cannot be altered
by users
22Access rights to resources
- Users can only print to certain printers
- So that users in different areas see different
printers - Users can only see network drives relevant to
their needs e.g. administrators see all resources - Access rights update, delete, edit, print, read
only, read/write
23Networked v. Standalone
- Login screen user has one more stage to
complete before they are able to use their system - More disk drives in screen user now has access
to drives that are logical rather than physical - Less control over data user may now find that
they have changed/no right to access files they
could previously
24Networked v. Standalone
- Physical appearance of workstation/environment
extra ports on machine/extra cable connected to
machine/ability to print to other machines/extra
hardware in the form of hubs - Access to remote/shared resources
- Less control over the interface inability to
customise - Increased communication using/via the machine