![Page 1: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/1.jpg)
Unit 2 – Assignment 2
Software Utilities?
1
![Page 2: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/2.jpg)
OBJECTIVES
Identify software utility types and examples of common software
Why are software utilities used?
Identify and describe the various networking threats.
Identify different methods of attack.
Describe the features of a firewall and how it can be used to protect against an attack.
Software Utilities? 2
![Page 3: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/3.jpg)
SOFTWARE UTILITIES?
Can be defined as
“A broad range of system software designed to help gather information, configure, optimise and maintain a Computer System”.
Software Utilities? 3
![Page 4: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/4.jpg)
EXAMPLES OF SOFTWARE UTILITIES?Firewall
Virus protection
Clean up tools
Drive Formatting/compression
Software Utilities? 4
![Page 5: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/5.jpg)
TASK
Software Utilities? 5
Task 1 - research the following tools
1. Firewall
2. Virus protection
3. Clean up tools
4. Drive Formatting/compression
Task 2 - Why do we use each of these tools? What are their functions
What are the strengths and weaknesses
![Page 6: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/6.jpg)
THE PURPOSE OF GIVEN SOFTWARE UTILITIESFirewall
Monitor and control traffic to and from a computer system
Virus protection Monitor the computer system to prevent, detect
and remove malware
Clean up tools Removes cookies and temporary files
Drive formatting /Compression Prepare a hard disk for use, provide a File System
Shrink the disk space used by a partition
Software Utilities? 6
![Page 7: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/7.jpg)
POTENTIAL NETWORK THREATS Describe risks of network intrusion
Software Utilities? 7
![Page 8: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/8.jpg)
NETWORKING THREATS Define the sources of network intrusion.
Software Utilities? 8
![Page 9: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/9.jpg)
NETWORKING THREATS Describe social engineering and phishing
Example
Software Utilities? 9
![Page 10: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/10.jpg)
METHODS OF ATTACK Describe viruses, worms, and Trojan horses.
Virus
Worm
Trojan Horse
Software Utilities? 10
![Page 11: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/11.jpg)
METHODS OF ATTACK
Describe viruses, worms, and Trojan horses.
Virus – Requires a Host to spread.
Worm – Able to Self replicate.
Trojan Horse - Comes in disguised as agenuine software or added to genuine software.
Software Utilities? 11
![Page 12: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/12.jpg)
METHODS OF ATTACK Denial of Service and Brute Force attacks
Software Utilities? 12
![Page 13: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/13.jpg)
OTHER MALWARE Spyware
Tracking cookies
Adware
Popup
Task – Determine the difference between these.
Software Utilities? 13
![Page 14: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/14.jpg)
SPAM
Unsolicited email
Typically commercial
1. Dictionary attacks
2. Search the Internet
And web pages for @ sign.
3. Gained from newsgroups and chat rooms
Commercial business exist offer a spamming service
Anti Spam software
Software Utilities? 14
![Page 15: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/15.jpg)
SECURITY PROCEDURES AND APPLICATIONS Define common security procedures
Software Utilities? 15
![Page 16: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/16.jpg)
PHISHING EXAMPLES Gum Tree Phishing examples
How to spot phishingSoftware Utilities? 16
![Page 17: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/17.jpg)
FIREWALL FEATURES AND HOW TO USE THEM TO PROTECT AGAINST AN ATTACK
What is a firewall?
Hardware/Software
PC or router based
One or two way?
Software Utilities? 17
![Page 18: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/18.jpg)
LAYERS WITH TCP/IP AND OSI MODEL
Software Utilities? 18
The firewall operates within
the TCP/IP layers.
Monitors and blocks based on
Port numbers (OSI Layer 4)
![Page 19: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/19.jpg)
APPLICATIONS AND LINKS TO PORT NUMBERS
Application layer name Port number
• DNS 53
• EMAIL 25,110,143
• FTP 21
• Web Server 80
Packet Tracer exercise
Stud share week 6
Software Utilities? 19
![Page 20: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/20.jpg)
FIREWALL TASK
Assignment 2 - Outcome P8 will be carried out within this assignment evidenced by witness statement.
To achieve this carry out all tasks on the witness statement and complete the written tasks, upload these to Turnitin as evidence.
Software Utilities? 20
![Page 21: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried](https://reader034.vdocument.in/reader034/viewer/2022042507/5f91a67c1ac6190f5409c424/html5/thumbnails/21.jpg)
SUMMARY
Computer and networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals.
Effective security is based on a variety of products and services.
A Firewall controls traffic between networks and helps prevent unauthorized access.
Software Utilities? 21