Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
In pairs/tables, discuss all of the key words you associate with network security and then write them down on your own worksheet
(5 mins)
To understand what is meant by cyber security
To understand why security is of importance
To explore the main threats to cyber security
What is network/cyber security?
A set of measures taken to protect a computer from harm to its data and software.
It also includes the protection of computer networks from unauthorised access.
Cyber security could be included as a longer response question in the paper so to help you remember.....
In EXACTLY 100 words sum up:
What cyber security is
Why it is important
What motivates us to protect our data (Hint: include legislation)
Print, hole punch and file in folder
Now we understand what Cyber security is, we will look in more detail at some of the things that are a threat to security
Malicious Software - this is a topic in its own but:
Viruses
Worms
Spyware
Ransomware
Trojan
You can create a network with very high security, but people are always a weak link!
An attack where users are tricked/bribed/threatened is called a social attack
This type of social attack is important and serious enough to be given it's own name!
Phishing involves sending out emails or making phone calls pretending to be a legitimate authority such as a bank manager
1. Pretend there is an urgent problem
2. Provide a way to stop this taking place
3. The real details you enter are provided to the phisher
The most basic way of breaking a password
A program tries every combination of letter/number until the correct one is found - OFTEN USING A DICTIONARY
Easily prevented by setting a limit upon how many guesses can be input before the account is locked or using two-step authentication
Flooding a server with bogus requests in order to overwhelm it until it crashes
Can be achieved using hundreds or thousands of infected machines known as 'bots'. This is then called a Distributed Denial Of Service attack
Also called data interception
A server or router sits in between communications and copies data, before sending it on as normal
Having weak policies puts you at risk
Ensure staff are trained
Password policies
Encryption policies
Policies regarding USB sticks etc
Shared > Computing - ICT > Gcse (9-1) > Network Security > lesson 1 > Main
Use the mini web to help!
No copy and paste jobs, no excuses - You aren't 'putting it into my own words after'
3 different threats to network security
The name of an attack that causes a server to be overwhelmed with requests