Higher+Network+Security+Strategy

Overview
A security strategy must include the following:

Security of data
Keeping data secure from unathorised access

Access rights
Different levels of access can be Read Write Create Delete Modify Execute

Password protection
The choice of suitable and secure passwords is very important across a network, as hackers will use computers to attempt to guess commonly used username and password combinations.

Encryption
Encryption is the process of converting data into a format that can only be read by the intended recipient. Go to this section on encryption.

Viruses, trojans and worms
These are computer programs which are designed to maliciously attack computers and destroy data.

Denial of Service (DOS)
Many attackers will now try to disable an organisaton's online presence by carrying out a denial of service attack. Generally this involves hitting the organisation's network or servers with a high volume of traffic until it can no longer support legitimate network traffic.

Firewall
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorised Internet users from accessing private networks connected to the Internet, especially intranets.

Disaster Recovery
What strategies are in place to recover from disaster, whether it be malicious like hacking or a virus, or a natural disaster such as flood or fire. All organisations should plan for disaster recovery.

Data Integrity
It is important to ensure that all data processed and stored is accurate. Inaccurate data can have serious consequences for an organisation

Tasks
1. Look at the 6 levels of access rights. Write a short sentence describing the meaning of each. Which level gives the greatest access? Which access gives the least access.

2. Give 7 rules which can be used to devise strong passwords. Give a further 3 rules which can ensure passwords are not easily accessed by others.

3. Use a diagram to show how public/private encryption works. Use a diagram to show how SSL encryption works.

4. In your own words, explain what is meant by a virus, a trojan and a worm. What steps can be taken to prevent being infected by these programs?

5. Research a recent high-profile DOS attack. Write a short paragraph explaining what happened.

6. Investigate and note the features of a popular firewall program.