networks by : nicolas pottier. electronic security establishing techniques that allow users to prove...
TRANSCRIPT
![Page 1: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel](https://reader034.vdocuments.mx/reader034/viewer/2022051400/55142f39550346e7488b5eae/html5/thumbnails/1.jpg)
NETWORKS
By : Nicolas Pottier
![Page 2: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel](https://reader034.vdocuments.mx/reader034/viewer/2022051400/55142f39550346e7488b5eae/html5/thumbnails/2.jpg)
Electronic security
Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel using computers.
Example : BiometricsExample : Password
![Page 3: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel](https://reader034.vdocuments.mx/reader034/viewer/2022051400/55142f39550346e7488b5eae/html5/thumbnails/3.jpg)
Licences
When users are authorised to use technology legally according to the Operator’s terms and conditions. Example : Concurrent licensing(Purchased by one user but can be given to third parties.)
Example : Single user licensing(Purchased by one user and can only be used by that person.)
![Page 4: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel](https://reader034.vdocuments.mx/reader034/viewer/2022051400/55142f39550346e7488b5eae/html5/thumbnails/4.jpg)
Physical security
Physical barriers and controls that protect resources from any accidental or deliberate threats.
Example : VaultsExample : Locks
![Page 5: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel](https://reader034.vdocuments.mx/reader034/viewer/2022051400/55142f39550346e7488b5eae/html5/thumbnails/5.jpg)
Monitoring
Keeping surveillance on and/or recording the emissions of a user in order to maintain security or for system improvements.
Example : Keystroke monitoring Example : system performance
![Page 6: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel](https://reader034.vdocuments.mx/reader034/viewer/2022051400/55142f39550346e7488b5eae/html5/thumbnails/6.jpg)
Network policiesSets of conditions, constraints, and settings that indicate to users how they can or cannot manipulate the network.
Example : Disaster recovery(Recovering resources from a critical state due to human or natural disasters.)
Example : Archiving data
![Page 7: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel](https://reader034.vdocuments.mx/reader034/viewer/2022051400/55142f39550346e7488b5eae/html5/thumbnails/7.jpg)
Codes of ethics and professional conduct
Guidelines written by an organization to workers, helping them conduct their actions in accordance with its primary values and ethical standards.
Example : The Association for Computing Machinery (ACM)
![Page 8: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel](https://reader034.vdocuments.mx/reader034/viewer/2022051400/55142f39550346e7488b5eae/html5/thumbnails/8.jpg)
Data centres
A facility used to house computer systems and other component systems.
Example : Google server
![Page 9: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel](https://reader034.vdocuments.mx/reader034/viewer/2022051400/55142f39550346e7488b5eae/html5/thumbnails/9.jpg)
Energy usage
The energy consumption when the technology is at a full potential and working efficiently, day in and day out.
Example : Uninterruptible power supply(capability of switching to a back up generator in the circumstance that there is a power cut, therefore no power interruption)
Back- up generator
![Page 10: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel](https://reader034.vdocuments.mx/reader034/viewer/2022051400/55142f39550346e7488b5eae/html5/thumbnails/10.jpg)
THANK YOU!