Identifying and preventing vulnerabilities - Network security - OCR - GCSE Computer Science Revision - OCR - BBC Bitesize (2024)

Identifying and preventing vulnerabilities

One of the roles of the manager is to ensure the network is safe from attacks and threats of any kind. There are many techniques that can be used to help keep a network safe, including:

  • secure

The purpose of penetration testing is to determine how a network is against an attack. It involves authorised users (sometimes an external party or organisation) who probe the network for potential weaknesses and attempt to exploit them. that enables network managers to test the resilience of networks themselves is also available.

Network forensics

Network forensics involves monitoring the traffic on a network. At regular intervals transmitted packets are copied. The copy and information about the packet are then stored for later analysis. This is usually processed in batches. The information gathered can help identify invasive traffic (from hackers) or to determine where data is being sent.

Network policies

Users of a network are often the source of threats, whether accidental or deliberate. A network manager should have an acceptable use policy which ensures:

  • users have a secure, hard-to-guess password which meets specified conditions
  • users change their password on a regular basis
  • users cannot connect unauthorised equipment to the network, such as USB memory sticks, smartphones and tablets
  • levels of access are given, which allow only authorised users to access sensitive data
  • a regular procedure is in place
  • a disaster recovery procedure exists in case of data loss
  • regular penetration testing and forensic analysis
  • regular maintenance including applying software upgrades and security to equipment
  • preventing physical access to servers
  • maintaining a high level of security with up-to-date and firewalls

User access levels

Access levels determine the facilities a user has access to, such as:

  • software
  • email
  • internet access
  • documents and data
  • the ability to install and/or remove software
  • the ability to maintain other users' accounts

A network manager should make sure users can only access the facilities they need. For example, an office worker might need access to productivity software, email and the internet, but not to install software or access other users' accounts. Restriction limits the actions a user can take, thereby reducing the potential of threats.

Identifying and preventing vulnerabilities - Network security - OCR - GCSE Computer Science Revision - OCR - BBC Bitesize (2024)
Top Articles
The ASC 606 transition: Identifying performance obligations
50 Foods That Are Super Healthy
Ffxiv Act Plugin
Diario Las Americas Rentas Hialeah
Libiyi Sawsharpener
Chicago Neighborhoods: Lincoln Square & Ravenswood - Chicago Moms
Grange Display Calculator
Ecers-3 Cheat Sheet Free
Best Private Elementary Schools In Virginia
biBERK Business Insurance Provides Essential Insights on Liquor Store Risk Management and Insurance Considerations
Hello Alice Business Credit Card Limit Hard Pull
Tokioof
Yesteryear Autos Slang
Thayer Rasmussen Cause Of Death
Palace Pizza Joplin
Turning the System On or Off
Gma Deals And Steals Today 2022
Busby, FM - Demu 1-3 - The Demu Trilogy - PDF Free Download
Overton Funeral Home Waterloo Iowa
Xomissmandi
U Arizona Phonebook
Ruben van Bommel: diepgang en doelgerichtheid als wapens, maar (nog) te weinig rendement
Parentvue Clarkston
Sprinkler Lv2
/Www.usps.com/International/Passports.htm
Uta Kinesiology Advising
The Weather Channel Local Weather Forecast
A Man Called Otto Showtimes Near Cinemark University Mall
Cookie Clicker Advanced Method Unblocked
Turbo Tenant Renter Login
Belledelphine Telegram
Narragansett Bay Cruising - A Complete Guide: Explore Newport, Providence & More
Pokemon Inflamed Red Cheats
Gt7 Roadster Shop Rampage Engine Swap
Elanco Rebates.com 2022
Missing 2023 Showtimes Near Grand Theatres - Bismarck
Naya Padkar Newspaper Today
Dynavax Technologies Corp (DVAX)
Jasgotgass2
60 X 60 Christmas Tablecloths
Oppenheimer Showtimes Near B&B Theatres Liberty Cinema 12
Mississippi weather man flees studio during tornado - video
National Weather Service Richmond Va
Southwest Airlines Departures Atlanta
Oklahoma City Farm & Garden Craigslist
Cult Collectibles - True Crime, Cults, and Murderabilia
Fresno Craglist
2000 Fortnite Symbols
Lsreg Att
Ippa 番号
Texas Lottery Daily 4 Winning Numbers
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 6229

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.