Please enable JavaScript.
Coggle requires JavaScript to display documents.
Measures College can take in securing their systems. PART 2, Explaining…
Measures College can take in securing their systems. PART 2
Diskless networks
What it is?
Explaining the use of the encryption techniques and how it works?
This can keep the network secure by?
Use of back-ups
What it is?
Back-ups is where data can be restored. A vital part of being a network administrator is being able to restore disks and backing up data. Having an effective back-up relies on working out the quantity that is needed but also the frequency.
Some organisations complete a full backup every 8 hours. This is because the data is changing.
Explaining the use of the encryption techniques and how it works?
Backup encryptions can protect your data from any ransomware attacks. Having back-ups can protect the risk of damage or loss of power.
How to keep the network secure?
Audit logs
What it is?
These are used to keep a record of the network and data. The ‘audit log’ will:
Allow administrators to track any system issues.
Maintain a precise record of how any system has been used.
Place alarms in place on a system.
Alerting administrators to any malicious activity.
A audit log can contain references that belong to the service. This can be accessed by the user.
Explaining the use of the encryption techniques and how it works?
They can keep the network secure by?
Firewall Configurations
Explaining the use of the encryption techniques and how it works?
This can keep the network secure by?
What it is?
Most of the firewalls that are used at home are automatic. Firewall configuration is used to ensure how effective the transit of data is. The purpose of a firewall is to block unwanted traffic from entering a network. Many systems will not allow traffic to exit, only if the user has ‘authenticated’ it using the system.
Most firewalls work together with a network address, with the internal devices that may be hidden.
Virus Checking Software
What it is?
Explaining the use of the encryption techniques and how it works?
This can keep the network secure by?
VPNs
What it is?
Explaining the use of the encryption techniques and how it works?
This can keep the network secure by?
Intrusion detection systems
What it is?
Explaining the use of the encryption techniques and how it works?
This can keep the network secure by?
Passwords
What it is?
Explaining the use of the encryption techniques and how it works?
This can keep the network secure by?
Levels of access to data
What it is?
Explaining the use of the encryption techniques and how it works?
-This can keep the network secure by?
Software updating
What it is?
This action guarantees that the system is safe from any faults or vulnerabilities that may appear. The updating process is automatic.
Explaining the use of the encryption techniques and how it works?
This can keep the network secure by?
Explaining the operation/ the use of the Vernam Cipher
Explain the encryption and decryption techniques:
The strengths of the security that is offered:
1ST PART OF THIS REPORT
2nd PART OF THIS REPORT
Explain the use of public and private keys in encryption: