mariocunhadotblog.files.wordpress.com  · web viewwhen you get in and out there for your time you...

13
Task 2 https://classroom.google.com/u/1/c/MTU1MzM4MDMzOTRa/a/ Mzc5NzAyNzk3MTFa/details Physical security: You can put locks on data which will prevent others from being able to access some data other example is in real life example like schools have teacher’s ID which will have access more functions for example it will open door another example is private elevators for people with the ID. This will prevent students from damaging property whilst teachers are not attending, in addition it will prevent people from stealing things in the classroom such as computers are students haven’t got access to open doors, only teachers and IT technicians. Visitors pass is created to prevent random people walking around somewhere they shouldn’t be allowed in, whereas if you have visitors pass the school would know you can be there and that you ain’t causing any danger to anyone. It would have the date and details of the user just in case that anything happened for security and for safety of others.

Upload: others

Post on 04-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: mariocunhadotblog.files.wordpress.com  · Web viewwhen you get in and out there for your time you work will depend on your pay and you can’t really lie if you wake up late. Biometrics

Task 2

https://classroom.google.com/u/1/c/MTU1MzM4MDMzOTRa/a/Mzc5NzAyNzk3MTFa/details

Physical security:

You can put locks on data which will prevent others from being able to access some data other example is in real life example like schools have teacher’s ID which will have access more functions for example it will open door another example is private elevators for people with the ID.

This will prevent students from damaging property whilst teachers are not attending, in addition it will prevent people from stealing things in the classroom such as computers are students haven’t got access to open doors, only teachers and IT technicians.

Visitors pass is created to prevent random people walking around somewhere they shouldn’t be allowed in, whereas if you have visitors pass the school would know you can be there and that you ain’t causing any danger to anyone. It would have the date and details of the user just in case that anything happened for security and for safety of others.

Having a sign in/out in any work place and college is a must and super important because if anything happens they would know if your inside college or not, if there is a fire to confirm that everyone is outside because if they hadn’t yet signed out they might have still been in college or trapped in the fire in college/ workplace. It will also prevent scamming and things like that because you have to tap

Page 2: mariocunhadotblog.files.wordpress.com  · Web viewwhen you get in and out there for your time you work will depend on your pay and you can’t really lie if you wake up late. Biometrics

when you get in and out there for your time you work will depend on your pay and you can’t really lie if you wake up late.

Biometrics

Now days there are many types of security such as finger prints to unlock your phone or even more advanced retinal scans which is when you use your eye as the code/ password to unlock something and lastly you can use voice recognition in order to unlock things these are physical and logical systems which are used to stop unauthorized access to a person’s private data, if it’s something important you may have to do more than just one security test/ password to confirm that you’re the right person for example finger print and retinal scans.

Page 3: mariocunhadotblog.files.wordpress.com  · Web viewwhen you get in and out there for your time you work will depend on your pay and you can’t really lie if you wake up late. Biometrics

Voice recognition can be used to confirm that it’s the person who they say they are by the sound of there voice so that you don’t pretend to be someone you’re not to steal. Its also a fast way to login into your device in a fast and easy way as you don’t need to make contact with the device much as it audio. Dangers of voice recognition is that someone could record your voice and be able to unlock your phone and be able steal important data from you.

Guards will protect everyone which works in the company and is responsible in keeping an eye out for everything happening to prevent hazards and to protect the clients, they are important to prevent criminals from committing a criminal act for example getting into the company and stealing anything such as data or devices from the company. And unauthorised entry inside the company guards will commonly check the hole building when its about to close to confirm that no one is left in the building to prevent any stealing and for safety reasons.

Cable shielding are used to protect from electromagnetic interference. The wire gets wrapped with a conductive layer to protect it from this. It helps to prevent people from cancelling your data transaction by causing electromagnetic interference and by having cable shieling it will prevent does people from being able to stop your communication by causing electronic interference.

Page 4: mariocunhadotblog.files.wordpress.com  · Web viewwhen you get in and out there for your time you work will depend on your pay and you can’t really lie if you wake up late. Biometrics

Shielding stops cables close to each other from crosstalking. Shielding covers not only the wire, but also the equipment and people.

Software and network security:

Encryption techniques such as private key and public key are both used to encode information.

They both use encryptions codes called symmetric and asymmetric. Asymmetric encryption in order for better security on the information makes it unreadable, whereas message sender will do the opposite and encrypt the message and find what's the meaning of it by using the public key. The receiver of the message would just decrypt the message with their private key.

The private key is a secret key which is used to decrypt the message from the sender and the receiver. However, they try to prevent this by adding a secret key between the 2 communicators which is the encryption.

Call back in software and network security is a dial up which means that it’s a system you can get to the network remotely, this makes it safer because you will only be able to access it if you have authority and even with authority the access from the system the network this can’t be accessed from anywhere. How it works is the user will put in the password and username to login into the system. The system would then hang up and call back with a preconfigured number, this makes it so much safer and will prevent from any outside access. The reason why this is super useful is because it confirms that the person who is trying to login is actually that person, so its like when a bank when they may suspect there may be some sort of suspicious activities when connecting to a bank account they may call to verify.

Page 5: mariocunhadotblog.files.wordpress.com  · Web viewwhen you get in and out there for your time you work will depend on your pay and you can’t really lie if you wake up late. Biometrics

Handshake means the connection between 2 devices, the authorization or even the speed of the computer’s connection. Example of the handshaking takes place is when tones are heard after the dialling which means that the computers are communicating.

It happened for example when a WAN network communicates with Lan’s or other WAN’s, it completes this task so that sending data cross becomes improved.

Disk less networks, a disk less network is a network that doesn’t have hard drives and relies on a database network boot to boot an operating system to each workstation. It also can store files on the network and even share it between them.

Use of backups, this used in case you ever lose anything or if something goes wrong you are able to go to that backup which you created and everything will go back to normal again. In addition, companies will have many backups in many locations just in case the location gets into an incident for example fire and the place where the data is gets burnt and all of the data stored gets lost.

That is why having backups in different locations is important, you would also be able to get your work back if your file ever corrupted and stops working.

Another example is if the system gets hacked and the hacker ends up destroying everything, the company could use their backup and get most of their data and things back.

Page 6: mariocunhadotblog.files.wordpress.com  · Web viewwhen you get in and out there for your time you work will depend on your pay and you can’t really lie if you wake up late. Biometrics

Audit Logs An audit report is a file that documents a process in a system. When logged in it will give sources address and the destination when it happened and also the information of the user logging in. It will also document Activities affecting the operation, event and files it will save the records of the network with logs. Its useful because if someone does something wrong you would be able to see who did it as records of their login would be kept and also what was done, this goes as far as internet history, what programs was used and what databases was used.

Firewall configuration is used to keep your computer safe; it determines what can be accessed on your pc and what could be suspicious according to firewall. For example, if someone send you dodgy file fire wall wouldn’t allow you to open it because it could be viruses and cause hard to your PC or allow hackers to manipulate your PC. Not only file, it can also prevent you from accessing certain internet pages which could be suspicious too, it will prevent malware too which could be used to steal data from your PC, this is because firewall would detect it and give you a warning.

Page 7: mariocunhadotblog.files.wordpress.com  · Web viewwhen you get in and out there for your time you work will depend on your pay and you can’t really lie if you wake up late. Biometrics

Virus checking software it will check your computer for viruses on the computer system and remove them, it’s good to do checks once in a while to prevent viruses on your device also will improve the performance of it, if it manages to delete any viruses on your computer.

Virtual private networks (VPN), this is used to make your ID unknown and to fake your location which you are using your device in for example I could turn on VPN and put that im currently in china. It means that you can make connections to other networks over the internet. It could be used to access setain sites which are blocked in certain countrys for example some websites are unable to be access from UK so you could put your VPN to a different country which is able to access that website. By using a VPN you will also be safer on the internet and anyone trying to cause harm to you however having a VPN actived can cause your computer to run a litle slower.

Intrusion detection systems this is things like firewall and a traffic monotor alert warning of people trying to entre into the system. IDS are powerful and they record attempts for the admin which then allows you to do whats best. This helps to ensure your safety and prevent you from getting hacked and will telly ou how to stop them. IDS can defence in areas such as security policy violation, key loggers, trojans, unauthorized accessing and configuration errors.

Page 8: mariocunhadotblog.files.wordpress.com  · Web viewwhen you get in and out there for your time you work will depend on your pay and you can’t really lie if you wake up late. Biometrics

Passwords for everything almost always have to have atleast one capital and one number and above 8 words. This is good because it makes everyones accounts safer and harder to be hacked so that no one can access your accounts.

Levels of access to data, this exists so that people don’t get access to everything, instead it gives you access to what you need. In a company they wouldn’t give a random worker access to the backend of a database however, if you work at the till you would have access to the front end. This prevents problems from happing for example changing data and messing up everything as they would be limited to a set of information only where they would be able to access only. Another thing is that not many people would have the sensitive data access there for if anything happened or goes wrong on that area it would be narrowed down to a smaller number of people.

Example:

Page 9: mariocunhadotblog.files.wordpress.com  · Web viewwhen you get in and out there for your time you work will depend on your pay and you can’t really lie if you wake up late. Biometrics

Software updating this is important to remove potential unsaved things on the software, and issues that the software may have, so when it gets updated it would remove these types of issues it may also just improve performance and the use ability of it.

Disaster recovery which means if there is ever a disaster you would be protected with your recovery and get your stuff back; another example is if you get hacked and your files get damaged you could get your data back from your recovery.

Types of disasters:

Backup systems this is super common in company’s it does regular backups for everything just in case of any corruption of any problems which may appear, you are able to just go back a bit and get your data back to how it was previously. Also, the backups would be stored in many locations to prevent the backups also being damaged long with side with the main data, this will mean that there is even less of a chance of anything happening to the backups created as they would be stored in different locations and online.

Page 10: mariocunhadotblog.files.wordpress.com  · Web viewwhen you get in and out there for your time you work will depend on your pay and you can’t really lie if you wake up late. Biometrics

Whole system replacement is when they have no options like the above where you can just go to a backup instead with hole system replacement you would be your last option after it all failed and the system as a hole was damaged then you have to start your company from crash again which means you would of wasted so much time and effect to build strong which know you would have to do again, this is why its so important to have many backups in many locations so that if one location got destroyed you wouldn’t be losing everything.

Tiers of recovery:

Tier 0: No off-site data. Data is unsafe, if the power went down you would end up losing all the company’s data since you last saved.

Tier 1: Data backup with no hot site which means there is backups saved however there are no replacement location if the system fails.

Tier 2: Data backup with a hot site, they saved their data on “dark site”. There for there are backups of the company’s data with an available transfer data control too.

Tier 3: Electronic vaulting, lots of copies of the company’s data are saved.

Tier 4: Point-in-time copies. Remote data copies are identical to local data.

Tier 5: Transaction integrity, will ensure that the copy’s are right there for are the same as the real one.

Tier 6: Zero or near-Zero data loss, this is for companies that mirror sudden faults can cause transnational data lost so it is super important for company’s that are with super-fast system.

Tier 7: Highly automated, business integrated solution. Application recovery is automated, enabling systems and applications to be restored much faster and more reliably than manual business continuity procedures would be possible