Unit 7 -Task 1 - Encryption and network securityP1 M2

Download Report

Transcript Unit 7 -Task 1 - Encryption and network securityP1 M2

LO: To be able to describe and compare encryption methods and software and network security
All of you will be able to:
Describe how encryption measures can help keep systems secure (M2)
Describe how software and network security can keep systems and data secure (P3, D1)
You have to offer them a visual way of understanding system security and disaster recovery.
Create a poster, which will be the thrust of your message, it must include:
What physical security measures can help keep a system secure P2
You must include the operation of an encryption technique and how it is used M2
How software and network security can keep systems an data secure P3 D1
NB to achieve the D1 you must discuss different ways of recovering form a disaster, you can
use short paragraphs to discuss your reasons
The poster does not have to be a ‘flat’ style it can be interactive….
Keyword:
Encryption
Security
LO: To be able to describe and compare encryption methods and software and network security
All of you will be able to:
Describe how encryption measures can help keep systems secure (M2)
Describe how software and network security can keep systems and data secure (P3, D1)
Encryption – a Method of converting normal
information such as text, images and media into a
format which is intelligible unless you are in
possession of the key that is the basis of the
conversion
Software and Network security– To combat intrusion
and subversion of a networked computer system and
commonplace accidental damage of data and
resources
Keyword:
Encryption
Security
LO: To be able to describe and compare encryption methods and software and network security
All of you will be able to:
Describe how encryption measures can help keep systems secure (M2)
Describe how software and network security can keep systems and data secure (P3, D1)
Using a table describe and give advantages and disadvantages of each of the following
physical security methods:
Software and network security
Encryption
Handshaking
RSA
Public/private key
Prime number
Call back
Diskless network
Use of backups (incremental and differential)
Redundancy
RAID
Mirroring
Audit Logs
Firewall Configurations
Virus Checking Software (include Heuristic)
Keyword:
Encryption
Security
Use of VPNs
Intrusion detection systems (Access control lists,
routing protocols)
Passwords
Level of access to data
Software updating
Disaster recovery
Audit Logs
Firewall Configurations
Virus Checking Software (include Heuristic)
Use of VPNs
Intrusion detection systems (Access control lists,
routing protocols)
Passwords
Level of access to data
Software updating
Disaster recovery
LO: To be able to describe and compare encryption methods and software and network security
All of you will be able to:
Describe how encryption measures can help keep systems secure (M2)
Describe how software and network security can keep systems and data secure (P3, D1)
Progress check:
Feedback on terms with descriptions, advantages and
disadvantages.
Keyword:
Encryption
Security
LO: To be able to describe and compare encryption methods and software and network security
All of you will be able to:
Describe how encryption measures can help keep systems secure (M2)
Describe how software and network security can keep systems and data secure (P3, D1)
Using a table describe and give advantages and disadvantages of each of the following
physical security methods:
Software and network security
Encryption
Handshaking
RSA
Public/private key
Prime number
Call back
Diskless network
Use of backups (incremental and differential)
Redundancy
RAID
Mirroring
Audit Logs
Firewall Configurations
Virus Checking Software (include Heuristic)
Keyword:
Encryption
Security
Use of VPNs
Intrusion detection systems (Access control lists,
routing protocols)
Passwords
Level of access to data
Software updating
Disaster recovery
Audit Logs
Firewall Configurations
Virus Checking Software (include Heuristic)
Use of VPNs
Intrusion detection systems (Access control lists,
routing protocols)
Passwords
Level of access to data
Software updating
Disaster recovery
LO: To be able to describe and compare encryption methods and software and network security
All of you will be able to:
Describe how encryption measures can help keep systems secure (M2)
Describe how software and network security can keep systems and data secure (P3, D1)
Plenary
Can any one of the security methods be called
‘the best’??
Discuss
Keyword:
Encryption
Security