• thinkigcse.com

Ways of securing computer networks

  • Access authorization restricts access to a computer to group of users through the use of authentication systems. These systems can protect either the whole computer - such as through an interactive logon screen - or individual services, such as an FTP server. There are many methods for identifying and authenticating users, such as passwords, identification cards, and, more recently, smart cards and biometric systems.

password

  • Anti-virus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware).
  • Application with known security flaws should not be run. Either leave it turned off until it can be patched or otherwise fixed, or delete it and replace it with some other application. Publicly known flaws are the main entry used by worms to automatically break into a system and then spread to other systems connected to it.
  • Backups are a way of securing information; they are another copy of all the important computer files kept in another location. These files are kept on hard disks, CD-Rs, CD-RWs, and tapes. There is also a fourth option, which involves using one of the file hosting services that backs up files over the Internet for both business and individuals.
  • Encryption is used to protect the message from the eyes of others. It can be done in several ways by switching the characters around, replacing characters with others, and even removing characters from the message. These have to be used in combination to make the encryption secure enough, that is to say, sufficiently difficult to crack.
  • Firewalls are systems which help protect computers and computer networks from attack and subsequent intrusion by restricting the network traffic which can pass through them, based on a set of system administrator defined rules.

firewalls

  • Honey pots are computers that are either intentionally or unintentionally left vulnerable to attack by crackers. They can be used to catch crackers or fix vulnerabilities.
  • Intrusion-detection systems can scan a network for people that are on the network but who should not be there or are doing things that they should not be doing, for example trying a lot of passwords to gain access to the network.
  • Pinging:The ping application can be used by potential crackers to find if an IP address is reachable. If a cracker finds a computer they can try a port scan to detect and attack services on that computer.
  • Social engineering awareness keeps employees aware of the dangers of social engineering and/or having a policy in place to prevent social engineering can reduce successful breaches of the network and servers.

Exciting News!

IMPORTANT MESSAGE

Quizzes and worksheets on this website have been developed in Flash format. Flash is no more supported by browsers. Therefore, you might see blank pages on some instances. Install Flash player plugin for Chrome from Chrome Web Store. Click here 

Similarly, for other web browsers you will have to activate the relevant flash player plugins.

JOIN OUR ONLINE COURSES

New Youtube Channel - ThinkIGCSE

Hi Everyone, I have launched a new YouTube channel with more than a 100 videos on  Economics and Business Studies, tailored specifically for IGCSE and A Level and IBDP students.

Subscribe now and join us on this learning journey: @thinkIGCSE

Save
Cookies user preferences
We use cookies to ensure you to get the best experience on our website. If you decline the use of cookies, this website may not function as expected.
Accept all
Decline all
Read more
Analytics
Tools used to analyze the data to measure the effectiveness of a website and to understand how it works.
Google Analytics
Our website uses Google Analytics to understand how you interact with our site and improve your browsing experience. These cookies collect information in an anonymous form, including the number of visitors to the site, where visitors have come from, and the pages they visited. The data helps us analyze trends and user behavior to enhance our website's functionality and content.
Accept
Decline
Marketing
Set of techniques which have for object the commercial strategy and in particular the market study.
Marketing
Our website uses Google marketing cookies to deliver personalized ads and measure the effectiveness of our advertising campaigns. These cookies track your online activity to help us show you relevant ads on Google services and partner websites.
Accept
Decline