Please enable JavaScript.
Coggle requires JavaScript to display documents.
Prevention methods of network threats (Back up policy (Having another copy…
Prevention methods of network threats
User access rights
Allocates spefic permisson to certain group of people
If virus or malware, limits where virus can spread to.
Passwords
Most common way. USer has to log in to access the files.
can succumb to bruteforce.However a 4 lettered password can take 10 minutes to guess where as 8 lettered password can take up to 7 years
Network policy
Set of rules in place to help protect the network.
E.g acceptable use
Acceptable use
Document someone signs when they are given access to the network.
Has rules such as choosing secure passwords
Back up policy
Having another copy of present data.
e.g who does the backups.
2 main types of back up.
Full or mirror and incremental
Full back up
It is a complete copy of all the data that needs to be backed up - for example user data, registry settings, system files.
For large data sets, this can take a long time
Can be fast to recover from backup as everything is there in one place A full backup is at least as large as the original data storage used (usually even larger due to indexing the data as well)
It is simple to recover only certain folders and files if need be The user may have changed their system configurations since the last backup, for example have installed new software - these altered settings may be lost when full recovery takes place.
Incremental backup
Fast compared to full backup as only changed files are backed up.
There needs to be at least one full backup made to start from
Efficient in terms of the storage needs There should not be too many incremantal backups before the next full one as this can make it difficult to get a complete restore done.
Every version of a file is stored - very handy if you want to see what changes were made to it over time May be inefficient storage - If you have a large data set and only a small amount of data is changed each time, then the indexing of the set can be much larger than the actual data.
Good backup software will allow the easy recovery of any stored version of the file and folders. Need to be much more careful in matching the backup schedule with how people are using the system - for example should it be done hourly, daily, weekly? How many increments to use and when are they purged and so on.
Multiple full backups can be stored so as to be able to 'roll back' fairly quickly Multiple full backups can require a large amount of storage and this is inefficient if only a small part of the data ever changes.
Disaster recovery
Should be policy in place to get the network and data back asap.
Network forensics
examines system logs to find out what part of the program went wrong. Then it fixes it and makes it stronger, If the monitor spots any unsual network traffic or server is really busy it is normal malware or a virus.
Anti-malware
Anti virus has a database iof common viruses and looks for them in the system. It looks out for the virus modifying important files. The database is updated everyday due to the number of viruses being discovered
Anti-malware is the process of stopping a malware from trying to take over a computer. The hard disk is scanned then RAM files and then the rest
Firewall
Sets rules on how data packets can enter or leave network.Can block certain access points. Problem with online gaming as a rule needs to be added to allow the ports they want to open. CAn also block certain ip adresses. CAn protect against denial of service and stop malware from leakingout.
Penetration testing
Hires hackers to try break into network. Use advanced hacking tools. Not given info on how network works. Contract with company on what they can and cannot do. Report is given on weakness and suggestions are given on what to do about it.
Encryption
Makes confidential data unreaedable. USers cypher to decode information.Encryption is based on mathematics. A 'key' is a very large random number, usually up to 256 bits
.