Search Header Logo
Network Security

Network Security

Assessment

Presentation

Computers

10th Grade

Practice Problem

Easy

Created by

michaele cabatbat

Used 67+ times

FREE Resource

18 Slides • 7 Questions

1

Networking

Information and Communications Technology - 10

Slide image

2

Objectives

  • describe the security issues that could arise from networking computers

  • explain how security issues can be prevented on a computer network

  • evaluate a range of physical and software based security methods for a computer network

3

Types of Security Issues

  • Unauthorized access

  • Malware

  • DoS

4

What is HACKING?

Slide image

5

Open Ended

Question image

What is HACKING?

6

Unauthorized Access

  • hacking is unauthorized access of a computer system

  • once access is obtained, confidential data or sabotage of data

  • many techniques to gain access, most common is to find out the username and password

Slide image

7

Open Ended

Question image

From what you learn before, list some techniques that a hacker can obtain a user's username and password.

8

Malware

  • is intrusive software that is designed to damage and destroy computers and computer systems [https://www.cisco.com]

  • Virus

  • Spyware

  • Trojan Horse

9

Virus

program that automatically make copies of itself to devices


usually cause damage to the files or system

Slide image

10

Spyware

program designed to secretly collects information from a computer


username, passwords, credit card information etc.


Slide image

11

Open Ended

Question image

What is TROJAN HORSE?

12

Trojan Horse

deleting data

blocking data

modifying data

copying data

disrupting the performance of computers or computer networks

Slide image

13

Denial of Service attack

is an attack meant to shut down a machine or network, making it inaccessible to its intended users [https://www.paloaltonetworks.com]

Slide image

14

How to prevent network attacks?

15

Slide image

How to Prevent Network Attacks?

16

Physical Security

  • protecting the equipment

  • security guard

  • physical locks on the server rooms

  • security card etc.

17

Security Methods

  • access rights

  • biometric

  • firewalls

  • encryption

  • anti-virus

  • anti-spyware

18

Access Rights

User is assigned a set of rights to access different parts of a system


Create

Read

Update

Delete

Slide image

19

Biometric

Use biological characteristics to authenticate user's identity

Slide image

20

Open Ended

List some biometric authentication methods

21

Encryption

is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key [https://us.norton.com/]

Slide image

22

Firewall

is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules [https://www.cisco.com]

Slide image

23

Multiple Choice

The following are types of Network Security ISSUES, except:

1

unauthorized access

2

malware

3

DoS

4

broken router

24

Multiple Select

Select all that best describes TROJAN HORSE

1

acts like a bona fide application or file to trick you

2

a type of malicious code or software that looks legitimate but can take control of your computer

3

designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network

4

significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes

25

Multiple Choice

These are biological measurements — or physical characteristics — that can be used to identify individuals. For example, fingerprint mapping, facial recognition, and retina scans

1

firewalls

2

biometrics

3

encryption

4

access rights

Networking

Information and Communications Technology - 10

Slide image

Show answer

Auto Play

Slide 1 / 25

SLIDE