System Security

  • Created by: jaz_st
  • Created on: 25-02-17 16:13

Penetration Testing

Targeted Testing: Performed by the oganisations IT team

External Testing: Test outside organisation, the web servers or firewalls

Internal Testing: This test mimics an inside attack from an employee

Blind testing: A blind test strategy simulates the actions and procedures of a real attacker

1 of 6

Network Forensics

Capturing and analysis of netork packets (packet sniffing)

It has two purposes

  • monitering a network for irregular traffic and identifying instructions
  • searching for keywords in packets and reading comminications such as emails or chat sessions.
2 of 6

Good network Policies

Passwords secure and containing uppercase, lowercase and numbers

Restricting User Access Levels

Not Sharing sensitiv data

Using company computers for work only

3 of 6

Anti-Maleware Software

E.g. Norton, AVG, Mcfee

Scans computer for maleware

Scans files as you open/download them for maleware

Removes maleware if found

4 of 6

Firewalls

Software on computer or hardware device attached to router 

Barrier to stop unwanted traffic entering the network

Filters traffic and informaton leaving the network ensuring is meets a specified criteria

5 of 6

Encryption

Convery data using code, the reader needs the key to the code to read it

Shared Key Encryption: The sender and the recipient have the same key.

6 of 6

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all How to keep a network secure resources »