Cross-Referencing Sheet for Unit 32 Networked Systems

345 Words2 Pages
Unit 32 Networked Systems Security Name: P1 | describe how networks can be attacked | Attacks: types e.g. denial of service, back door, spoofing, mathematical, brute force, software exploitation, viruses, rootkits, worms, Trojans, spyware, adwareSources of attacks: internal e.g. disaffected staff; external e.g. via internet connections or through unsecured wireless access point, viruses introduced by email | U4U8 P3 | P2 | describe how networked systems can be protected | Email systems: security features e.g. secure MIME, spam, hoaxing, relay agentsWireless systems: security features e.g. site surveys, MAC association, WEP/WPA keys, TKIPNetworked devices: security features e.g. router, switch, wireless access pointTransmission media: issues e.g. use of shielding | U10U25 | P3 | explain what an organisation can do to minimise security breaches in networked systems | Personal access control: devices e.g. biometrics, passwords, usernames, permissions, digital signaturesSecurity control at device level: access control e.g. protocols, log in, certificatesEncryption: e.g. encrypting files for confidentiality, encryption with application-specific tools, recoveringencrypted dataIntrusion detection systems: devices e.g. firewalls, virus protection, spyware protection, file monitoring,folder monitoring, use of honeypots, alarms | U7U10 | P4 | plan procedures to secure a network | Policies and procedures: monitoring; education and training; backup and recovery schemes; configuring and upgrading software; setting up file and folder permissionsUser responsibilities: adherence to specific guidelines e.g. strength of password, installation of new softwareEducation of IT professionals: maintenance of skills; knowledge of exploits; application of updates and patchesPhysical security of system: lock and key; logging of entry; secure room environments; authentication

More about Cross-Referencing Sheet for Unit 32 Networked Systems

Open Document