key words. investigating measures to control security risks ao2
TRANSCRIPT
![Page 1: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/1.jpg)
Key W
ord
s
![Page 2: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/2.jpg)
Investigating measures to control security risks
Ao2
![Page 3: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/3.jpg)
Think / Pair / Share
Answer the following question
“What reasons would someone want to harm a website”
![Page 4: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/4.jpg)
Pass
![Page 5: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/5.jpg)
Merit
![Page 6: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/6.jpg)
Distinction
![Page 7: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/7.jpg)
Controlling Access
• How do we control access here at St Johns?
![Page 8: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/8.jpg)
Register all users!
• Around 150 staff and 1500(ish) students, each have their own unique access.
• Stops people “borrowing” other peoples logins and gives unique accountability to actions on the network.
![Page 9: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/9.jpg)
Password Access
• Allows unique user id’s to remain unique to the user.
![Page 10: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/10.jpg)
Levels of AccessLevel of Access Name Job Title Responsibility
High G.Moran Headteacher Whole School
Medium / High G.McIntyre Subject Learning Co-Ordinator
Whole Department
Medium L.Willis / L.Chambers
Teachers of ICT Department / Pastoral Group
Medium / Low N/A Student Teacher Individual Groups
Low N/A Student Self
Why do we have different levels of access for different people?
![Page 11: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/11.jpg)
Today's Outcomes
• Glogster – Interactive Posters! • Create one going into huge detail
regarding two of these problems!
![Page 12: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/12.jpg)
Pass
• Candidates demonstrate a basic understanding, supported with few examples, of four valid measures, covering hardware and software that a website controller could use.
![Page 13: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/13.jpg)
Merit
• Candidates demonstrate understanding, supported with appropriate examples, of the effectiveness of six valid measures, covering hardware, software and procedures that a website controller could use.
![Page 14: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/14.jpg)
Distinction
• Candidates demonstrate understanding, supported with a variety of well chosen examples, of the effectiveness of eight valid measures, covering hardware, software and procedures that a website controller could use.
![Page 15: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/15.jpg)
Web Controller
• Web / Network Police
![Page 16: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/16.jpg)
Hacking Nerd
• Good and Bad Intentions
• Want access to either damage or highlight shortcomings.
![Page 17: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/17.jpg)
How can they be stopped
![Page 18: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/18.jpg)
• Website controllers have three methods of protection– Software– Hardware– Procedural
![Page 19: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/19.jpg)
Software
• Firewalls• Virus checker• Virus definition• Encryption (Public-key, Pretty
Good Privacy, digital signatures)
• Anonymisers• Remailers
![Page 20: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/20.jpg)
Hardware
• Quarantine machine
![Page 21: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/21.jpg)
Procedures
• passwords• machine id• activity monitoring• backup procedures• restore procedures
![Page 22: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/22.jpg)
Today's Format
• A web controller can stop accessing to his website using .....– It works by– He uses it because– Its advantages are– Its problems are
![Page 23: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/23.jpg)
Three Teams
Software
Procedures
Hardware
• Your going to answer these questions to the class in 60 minutes!
![Page 24: Key Words. Investigating measures to control security risks Ao2](https://reader037.vdocument.in/reader037/viewer/2022110206/56649d055503460f949d91ed/html5/thumbnails/24.jpg)
Outcomes
• You have the choice! – An instructional video to Web Controllers
advising them on how to stop this.– A series of Posters demonstrating your
advise– Anything you can reccomend!