Network Security Methods Flashcards
How would you set up user access rights
The network manager will set it up and will define groups and allocate specific permissions to those groups. The people using the network will be assigned to a group and all permissions related to that group
What do user access rights do
They stop people from accessing a file that they don’t need to see and they people who can see the file won’t be able to edit them
What is a network policy
a document that sets out the rules and procedures to help protect the network
What are the three types of network policies
- Acceptable use policy
- Recovery policy
- Back up policy
What is the use of a back up policy
This saves another copy of data in case the original data is lost or corrupted
What is the use of a recovery policy
In case if there is a fire, flood or a complete network breakdown then the recovery policy is there to get back the network and data ASAP
What are network forensics used for
To stop an attack on your network and determine what occurred in order to stop it from happening again
What is the most common way of looking what causes a network problem
Examine the system logs
What does a system log do -
It keeps a record of everything that takes place on the network this is so it can record the data packets sent and recieved
What does an Anti-Virus do
This is an app that detects a computer virus. It has a database of virus signatures and looks out for typical virus behaviour such as modifying important system files
What does Anti-Malware do
Because malware aren’t all viruses sometimes malware can detect key strokes or it can take control of your computer remotely. Anti-Malware can detect this and remove it
What does a firewall do
It sets the rules for how data packets can enter or leave the network
What is encryption
the process of scrambling a message or data in such a way that only the person knowing the correct key can read it
How does encryption help as another line of defence
Even if a network is accessed by an unauthorised person the data is encrypted to make is confidential and unreadable
What is the method to encrypt a message
Cipher