Please enable JavaScript.
Coggle requires JavaScript to display documents.
Network security - Coggle Diagram
Network security
Backup
-
Backups of all data should be made regularly, as the older the backed-up data becomes, the less likely it is to match any current data stored on a computer system.
A typical backup policy is called the grandfather-father-son method. The oldest backup copy would be named the grandfather, the second oldest backup being named the father and the most recent backup being called the son. When a new backup is made, the oldest backup, the grandfather is overwritten and becomes the son backup, with the original son becoming the father and the father becoming the grandfather. These backups should be stored off-site.
-
User access levels
It is not sensible or safe for every network user to have access to all the data on a computer system
User access levels define which users can change and view, view but not change, or not view stored system.
-
-
Encryption Techniques
Encryption is using an algorithm to convert data into a form called cyphertext that cannot be easily understood by people without decryption key.
When data is encrypted, the Xor logical operator is sometimes used.
XOR
The XOR logical operator has two inputs and one output. The output is 1 if either A or B, but not both of them at the same time.
Network policies
Acceptable us: Network policies are documents outlining the rules that users are required to follow while using a computer network. following its publication, networks will be expected to adhere to the rules.
Typical rules set out in these policies include: A list of unacceptable types of websites that should not be visited. Activities that are not allowed on the network, such as gambling and installation of unauthorised software. Acceptable use of resource, such as printers.
Disaster recovery
A disaster recovery policy outlines all the processes that must be carried out in the event of a disaster, such as data loss or a manmade error, to ensure that the business is able to perform normally within a short amount of time. Disasters include:
Fire, flood, lightning, terrorist attacks etc.
Hardware failure, e.g. power supply unit failing
Software failure, e.g. virus damage
Accidental and malicious damage, e.g. hacking
-
-
Cybersecurity
Cybersecurity refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyberattack.
Malware - short for malicious software, malware is a broad term used to describe software used to disrupt computer operation.
Viruses - a computer program that is able to copy itself onto other programs often with the intention of maliciously damaging data. A virus requires an attack vector - 'piggybacking' on another program or data file.