COMPUTER PLATFORMS Computer & Network Security  & User Support & Training Week 11
Week 11 <ul><li>Security </li></ul><ul><ul><li>Dangers </li></ul></ul><ul><ul><li>Attacks </li></ul></ul><ul><ul><li>Count...
Computer Security <ul><li>Danger! Danger! </li></ul><ul><ul><li>A variety of situations are dangerous to your computer or ...
Computer Security <ul><li>Your data is important! </li></ul><ul><ul><li>For whatever reason </li></ul></ul><ul><ul><ul><li...
Computer Security <ul><li>Attacks </li></ul><ul><ul><li>Someone (or something) doing stuff to your system(s) </li></ul></u...
Security Countermeasures <ul><li>Physical </li></ul><ul><ul><li>Keep machines under lock and key </li></ul></ul><ul><ul><u...
Security Countermeasures <ul><li>Enforce log-on and passwords for all users </li></ul>
Security Countermeasures <ul><li>Firewall </li></ul><ul><ul><li>Restricts access to networks </li></ul></ul><ul><ul><li>Fi...
Security Countermeasures <ul><li>Encryption </li></ul><ul><ul><li>Locking information by using a password or key </li></ul...
Security Rights <ul><li>Set access rights and permissions for files, folders and resources </li></ul><ul><li>Users </li></...
Security Rights <ul><li>Windows </li></ul>
Security Rights <ul><li>Novell </li></ul>
Computer Rights <ul><li>UNIX / Linux / MacOS </li></ul>User / owner Group <ul><ul><li>  - rw- r-- r--  user  adm 120  Jan ...
To err is human…  (even more so to blame it on the computer) <ul><li>It can only be attributable to human error?! </li></u...
Methods of support <ul><li>Support staff </li></ul><ul><ul><li>Required to solve problems </li></ul></ul><ul><ul><li>Look ...
Methods of support <ul><li>Support </li></ul><ul><ul><li>Some form is technical support will be required </li></ul></ul><u...
Week 11 <ul><li>Security </li></ul><ul><ul><li>Dangers </li></ul></ul><ul><ul><li>Attacks </li></ul></ul><ul><ul><li>Count...
Upcoming SlideShare
Loading in …5
×

COMPUTER

227 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
227
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

COMPUTER

  1. 1. COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11
  2. 2. Week 11 <ul><li>Security </li></ul><ul><ul><li>Dangers </li></ul></ul><ul><ul><li>Attacks </li></ul></ul><ul><ul><li>Countermeasures </li></ul></ul><ul><ul><ul><li>Rights </li></ul></ul></ul><ul><li>Users </li></ul><ul><ul><li>Problems </li></ul></ul><ul><ul><li>Support </li></ul></ul><ul><ul><li>Training </li></ul></ul>
  3. 3. Computer Security <ul><li>Danger! Danger! </li></ul><ul><ul><li>A variety of situations are dangerous to your computer or network </li></ul></ul><ul><ul><li>Standalone systems </li></ul></ul><ul><ul><ul><li>‘ Walk up’ access </li></ul></ul></ul><ul><ul><li>Networked computers </li></ul></ul><ul><ul><ul><li>Access to one system potentially allows access to entire network </li></ul></ul></ul><ul><ul><ul><li>Propagation of viruses </li></ul></ul></ul><ul><ul><ul><li>Remote access </li></ul></ul></ul><ul><ul><li>The Internet </li></ul></ul><ul><ul><ul><li>Essentially allowing ANYONE onto your computer or network </li></ul></ul></ul><ul><ul><ul><li>Viruses in email, downloaded by accident </li></ul></ul></ul><ul><ul><ul><li>Spam, pop-ups </li></ul></ul></ul>
  4. 4. Computer Security <ul><li>Your data is important! </li></ul><ul><ul><li>For whatever reason </li></ul></ul><ul><ul><ul><li>Sensitive business data </li></ul></ul></ul><ul><ul><ul><li>Personal information </li></ul></ul></ul><ul><ul><ul><ul><li>Financial information </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Credit Cards </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Address, telephone number </li></ul></ul></ul></ul><ul><ul><ul><li>Research data </li></ul></ul></ul><ul><ul><ul><li>Information about other people </li></ul></ul></ul><ul><ul><ul><li>etc. </li></ul></ul></ul><ul><ul><li>Plain invasion of privacy / theft </li></ul></ul><ul><ul><li>You don’t want someone else getting hold of it! </li></ul></ul><ul><ul><li>You don’t want someone corrupting your system or monitoring your activities </li></ul></ul>
  5. 5. Computer Security <ul><li>Attacks </li></ul><ul><ul><li>Someone (or something) doing stuff to your system(s) </li></ul></ul><ul><ul><ul><li>When they shouldn’t be! </li></ul></ul></ul><ul><li>3 things to worry about </li></ul><ul><ul><li>Crackers / Intruders </li></ul></ul><ul><ul><ul><li>Technically “hacker” is the wrong term </li></ul></ul></ul><ul><ul><ul><li>Attempt to break into your system </li></ul></ul></ul><ul><ul><ul><li>Access your data / steal stuff / exploit your machine </li></ul></ul></ul><ul><ul><li>Viruses </li></ul></ul><ul><ul><ul><li>Malicious programs </li></ul></ul></ul><ul><ul><ul><li>Very infectious </li></ul></ul></ul><ul><ul><ul><li>Uses the computers resources in some way </li></ul></ul></ul><ul><ul><li>Worms </li></ul></ul><ul><ul><ul><li>Self-replicating </li></ul></ul></ul><ul><ul><ul><li>Not normally malicious </li></ul></ul></ul><ul><ul><ul><ul><li>Just irritating </li></ul></ul></ul></ul><ul><ul><ul><li>Uses the computers resources in some way </li></ul></ul></ul>
  6. 6. Security Countermeasures <ul><li>Physical </li></ul><ul><ul><li>Keep machines under lock and key </li></ul></ul><ul><ul><ul><li>Only give access to those who need it </li></ul></ul></ul><ul><ul><li>Remove disk drives, access to ports </li></ul></ul><ul><ul><ul><li>e.g- disable USB access </li></ul></ul></ul><ul><ul><li>Nail down the machine - literally </li></ul></ul><ul><li>Non-technical </li></ul><ul><ul><li>Good, long passwords </li></ul></ul><ul><ul><ul><li>‘ jL04BM£h&~’ as opposed to ‘fred’ </li></ul></ul></ul><ul><ul><li>Don’t let software save your passwords / details </li></ul></ul><ul><ul><ul><li>‘ AutoComplete’, ‘Password Manager’, etc. </li></ul></ul></ul><ul><ul><li>Use an OS / NOS that supports good security </li></ul></ul><ul><ul><ul><li>Especially when networking </li></ul></ul></ul><ul><ul><ul><li>E.g.- Windows 2000 / Linux </li></ul></ul></ul><ul><ul><li>Keep OS up to date with patches/fixes </li></ul></ul><ul><ul><li>Install anti-virus software </li></ul></ul><ul><ul><li>Remember to log out </li></ul></ul>
  7. 7. Security Countermeasures <ul><li>Enforce log-on and passwords for all users </li></ul>
  8. 8. Security Countermeasures <ul><li>Firewall </li></ul><ul><ul><li>Restricts access to networks </li></ul></ul><ul><ul><li>Filters data packets </li></ul></ul><ul><li>Intrusion Detection System (IDS) </li></ul><ul><ul><li>Monitors network traffic for anything sinister </li></ul></ul><ul><ul><li>Flags unusual behaviour </li></ul></ul><ul><ul><li>Usually has the ability to block </li></ul></ul><ul><li>Ports </li></ul><ul><ul><li>Close all unused ports </li></ul></ul><ul><ul><li>Do not allow un-needed services </li></ul></ul><ul><li>Authentication </li></ul><ul><ul><li>Make sure you know who users are </li></ul></ul><ul><ul><li>Only allow authorised users access </li></ul></ul>
  9. 9. Security Countermeasures <ul><li>Encryption </li></ul><ul><ul><li>Locking information by using a password or key </li></ul></ul><ul><ul><li>Hiding data </li></ul></ul><ul><ul><li>Secure communications </li></ul></ul><ul><ul><ul><li>Information in transit can be encrypted </li></ul></ul></ul><ul><ul><li>Must be decrypted at the other end </li></ul></ul><ul><li>Security Policies </li></ul><ul><ul><li>Rules that everyone must adhere to </li></ul></ul><ul><ul><ul><li>Passwords </li></ul></ul></ul><ul><ul><ul><li>User names </li></ul></ul></ul><ul><ul><ul><li>Account / Group restrictions </li></ul></ul></ul><ul><li>Backup / Disaster Recovery </li></ul><ul><ul><li>Doesn’t prevent attack </li></ul></ul><ul><ul><li>Makes recovering easier </li></ul></ul>
  10. 10. Security Rights <ul><li>Set access rights and permissions for files, folders and resources </li></ul><ul><li>Users </li></ul><ul><ul><li>Have to administer each user </li></ul></ul><ul><ul><li>Time intensive </li></ul></ul><ul><li>Groups </li></ul><ul><ul><li>Organise similar users into groups </li></ul></ul><ul><ul><ul><li>E.g.- ‘Sales’ </li></ul></ul></ul><ul><ul><li>Administer group rather than user </li></ul></ul><ul><li>Basic rights: </li></ul><ul><ul><li>Read, Write, Execute, List </li></ul></ul><ul><li>In Windows NT, 2000, XP, 2003 </li></ul><ul><ul><li>Done using NTFS </li></ul></ul><ul><ul><ul><li>‘ New Technology’ File System </li></ul></ul></ul><ul><li>Also on MacOS, UNIX, Linux and Novell </li></ul>
  11. 11. Security Rights <ul><li>Windows </li></ul>
  12. 12. Security Rights <ul><li>Novell </li></ul>
  13. 13. Computer Rights <ul><li>UNIX / Linux / MacOS </li></ul>User / owner Group <ul><ul><li> - rw- r-- r-- user adm 120 Jan 21 mdt.tex </li></ul></ul><ul><ul><li>d rw- r-- rwx root root 1024 Feb 6 local </li></ul></ul>World Group Owner
  14. 14. To err is human… (even more so to blame it on the computer) <ul><li>It can only be attributable to human error?! </li></ul><ul><ul><li>People make mistakes </li></ul></ul><ul><ul><ul><li>Machines don’t! </li></ul></ul></ul><ul><ul><li>More and more computer illiterates are using computers! </li></ul></ul><ul><ul><ul><li>Install bad software </li></ul></ul></ul><ul><ul><ul><li>Accidentally change config settings </li></ul></ul></ul><ul><ul><ul><li>Go to dodgy web sites </li></ul></ul></ul><ul><ul><li>Things break / blow up / melt </li></ul></ul><ul><li>We must be able to put right these problems… </li></ul>
  15. 15. Methods of support <ul><li>Support staff </li></ul><ul><ul><li>Required to solve problems </li></ul></ul><ul><ul><li>Look after systems </li></ul></ul><ul><ul><ul><li>IT Manager </li></ul></ul></ul><ul><ul><ul><li>Systems Administrator </li></ul></ul></ul><ul><ul><ul><li>Technician </li></ul></ul></ul><ul><ul><li>Can be expensive to hire new staff </li></ul></ul><ul><ul><li>Provides ‘on-site’ support </li></ul></ul><ul><li>Training for existing staff </li></ul><ul><ul><li>Attempt to solve the problem before it occurs </li></ul></ul><ul><ul><ul><li>Stops staff breaking things </li></ul></ul></ul><ul><ul><li>Allow staff to be able to solve basic problems </li></ul></ul><ul><ul><li>Investing in training brings greater return on technology implementation </li></ul></ul><ul><ul><li>Saves money in the long-term </li></ul></ul><ul><ul><li>Costs money initially </li></ul></ul>
  16. 16. Methods of support <ul><li>Support </li></ul><ul><ul><li>Some form is technical support will be required </li></ul></ul><ul><ul><li>‘ Insurance’ in case of technical failure </li></ul></ul><ul><ul><ul><li>Especially with specialist equipment </li></ul></ul></ul><ul><ul><li>Two main types: </li></ul></ul><ul><ul><ul><li>On site (in house) support </li></ul></ul></ul><ul><ul><ul><ul><li>Involves employing one or more person(s) </li></ul></ul></ul></ul><ul><ul><ul><li>3rd Party support </li></ul></ul></ul><ul><ul><ul><ul><li>Service Level Agreements </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Can take time to solve a problem </li></ul></ul></ul></ul><ul><li>Maintenance </li></ul><ul><ul><li>Checks of equipment working order </li></ul></ul><ul><ul><ul><li>Routine maintenance checks / tasks </li></ul></ul></ul><ul><ul><li>Upgrading equipment and software </li></ul></ul><ul><ul><li>Keeping systems performance high </li></ul></ul><ul><ul><li>Continually updating any ‘live’ services </li></ul></ul><ul><ul><ul><li>Especially sales & marketing </li></ul></ul></ul>
  17. 17. Week 11 <ul><li>Security </li></ul><ul><ul><li>Dangers </li></ul></ul><ul><ul><li>Attacks </li></ul></ul><ul><ul><li>Countermeasures </li></ul></ul><ul><ul><li>Rights </li></ul></ul><ul><li>Users </li></ul><ul><ul><li>Problems </li></ul></ul><ul><ul><li>Support </li></ul></ul><ul><ul><li>Training </li></ul></ul>

×