Third Form How threats can affect computer networks
✔ Availability: assurance reliable access to information
✔ Integrity: accuracy and consistency of data. ✔ Confidentiality: set of rules that limits access to information Logical and physical security
✔ Physical security is the protection of people, assets and
property from physical actions that may cause loss or damage. For example: it prevents attackers from entering a building by installing alarms, fences, security guards etc.
✔ Logical security is the protection of computer software
and data by implementing passwords, biometrics and user identifications. Difference between physical and logical security ✔ Physical security protects the building and its assets, but logical security protects access to computer systems. Network Security measures ✔ Fire walls ✔ Antivirus software ✔ Network sniffers ✔ Anti spyware ✔ Network monitors ✔ Training employees ✔ Following procedures Fire walls ✔ A firewall is a software or hardware that filters data entering and leaving a network or computer. They block unauthorized access to or from private networks. Antivirus software
✔ An antivirus software is a utility program that protects a
computer or network from computer viruses. Network sniffers
✔ A Network sniffer is a software tool that examines data
flowing over a computer network in real time. This allows individuals or companies to capture data as it is transmitted over a network. Anti-spyware ✔ Anti-spyware is a type of software that is designed to detect and remove unwanted spyware programs. Spyware is a type of malware that is installed on a computer without the user's knowledge in order to collect information about them. Network Monitors ✔ Network monitoring is a critical IT process where all networking components like routers, switches, firewalls, servers, are monitored for fault and performance and evaluated continuously to maintain and optimize their availability. Employee training ✔ Employee training is a program that helps employees learn specific knowledge or skills to improve performance in their current roles. Following policies - Standard operating procedures