Professional Documents
Culture Documents
Computer Science: Systems Software and Security
Computer Science: Systems Software and Security
OCR and
Security
Computer Science
J276 Unit 3
Preventing vulnerabilities
2
Objectives
• Understand vulnerabilities to a system, and how they
happen.
• Explain the reason these vulnerabilities are a threat to
the system.
• Discuss ways to protect a system from threats.
Silent Starter
Student Teacher
• You now need to teach the rest of your group about
the threat you were given
• The rest of the group MUST complete the table at
the same time Network Forensics
Penetration Testing
Network policies
Password Protection
Network Forensics
Network Forensics allow special software to look at
businesses internet footprint.
Penetration Testing
Penetration Testing is a form of testing to look for
security weaknesses in a system.
The role is to;
• Gather Information about the target
• Identify possible entry points
• Attempt to break in
• Report back the findings
Network policies
A sensible Network Policy is very
important to keeping a network safe.
This includes;
• Mandatory resetting of passwords after a period of time.
• Restricting what files users are allowed to see and edit
• Restricting what folders users are allowed to see and
edit
• Restricting what websites users can access and what
they are allowed to download.
The CPU
Unit 1 Systems architecture, memory and storage
Anti-Malware Software
Malware can infect a computer from many different
ways.
Installing Anti-Malware software can stop an infection
on a computer.
This can be by scanning a USB before you are able to
access it.
Scanning downloads before they are opened,
especially .zip and .exe downloads.
The CPU
Unit 1 Systems architecture, memory and storage
Firewall
A firewall is designed to restrict what network traffic is
allowed to connect to and from your computer.
Password Protection
Password protection is important when trying to keep
your online accounts safe.
This includes;
• Creating a strong password that is not easy to guess
• Changing your password after a period of time
• Not having the same password for multiple accounts
• Read only folders, where the user can only view the
contents, and not edit.
• Not being able to even view certain folders.
• Restriction on what programs they can run.
The CPU
Unit 1 Systems architecture, memory and storage
Encryption
Encryption is the act of changing how
data looks, to make it impossible to
be read without an Encryption key.
Kahoot!
• www.kahoot.it