21
Unit 2 – Assignment 2 Software Utilities? 1

1 Unit 2 Assignment 2 - wiki.computing.hct.ac.ukwiki.computing.hct.ac.uk/_media/computing/btec/level3/lesson12... · THE PURPOSE OF GIVEN SOFTWARE UTILITIES Firewall Monitor and control

  • Upload
    vocong

  • View
    220

  • Download
    0

Embed Size (px)

Citation preview

Unit 2 – Assignment 2

Software Utilities?

1

OBJECTIVES

Identify software utility types and examples of common software

Why are software utilities used?

Identify and describe the various networking threats.

Identify different methods of attack.

Describe the features of a firewall and how it can be used to protect against an attack.

Software Utilities? 2

SOFTWARE UTILITIES?

Can be defined as

“A broad range of system software designed to help gather information, configure, optimise and maintain a Computer System”.

Software Utilities? 3

EXAMPLES OF SOFTWARE UTILITIES?Firewall

Virus protection

Clean up tools

Drive Formatting/compression

Software Utilities? 4

TASK

Software Utilities? 5

Task 1 - research the following tools

1. Firewall

2. Virus protection

3. Clean up tools

4. Drive Formatting/compression

Task 2 - Why do we use each of these tools? What are their functions

What are the strengths and weaknesses

THE PURPOSE OF GIVEN SOFTWARE UTILITIESFirewall

Monitor and control traffic to and from a computer system

Virus protection Monitor the computer system to prevent, detect

and remove malware

Clean up tools Removes cookies and temporary files

Drive formatting /Compression Prepare a hard disk for use, provide a File System

Shrink the disk space used by a partition

Software Utilities? 6

POTENTIAL NETWORK THREATS Describe risks of network intrusion

Software Utilities? 7

NETWORKING THREATS Define the sources of network intrusion.

Software Utilities? 8

NETWORKING THREATS Describe social engineering and phishing

Example

Software Utilities? 9

METHODS OF ATTACK Describe viruses, worms, and Trojan horses.

Virus

Worm

Trojan Horse

Software Utilities? 10

METHODS OF ATTACK

Describe viruses, worms, and Trojan horses.

Virus – Requires a Host to spread.

Worm – Able to Self replicate.

Trojan Horse - Comes in disguised as agenuine software or added to genuine software.

Software Utilities? 11

METHODS OF ATTACK Denial of Service and Brute Force attacks

Software Utilities? 12

OTHER MALWARE Spyware

Tracking cookies

Adware

Popup

Task – Determine the difference between these.

Software Utilities? 13

SPAM

Unsolicited email

Typically commercial

1. Dictionary attacks

2. Search the Internet

And web pages for @ sign.

3. Gained from newsgroups and chat rooms

Commercial business exist offer a spamming service

Anti Spam software

Software Utilities? 14

SECURITY PROCEDURES AND APPLICATIONS Define common security procedures

Software Utilities? 15

FIREWALL FEATURES AND HOW TO USE THEM TO PROTECT AGAINST AN ATTACK

What is a firewall?

Hardware/Software

PC or router based

One or two way?

Software Utilities? 17

LAYERS WITH TCP/IP AND OSI MODEL

Software Utilities? 18

The firewall operates within

the TCP/IP layers.

Monitors and blocks based on

Port numbers (OSI Layer 4)

APPLICATIONS AND LINKS TO PORT NUMBERS

Application layer name Port number

• DNS 53

• EMAIL 25,110,143

• FTP 21

• Web Server 80

Packet Tracer exercise

Stud share week 6

Software Utilities? 19

FIREWALL TASK

Assignment 2 - Outcome P8 will be carried out within this assignment evidenced by witness statement.

To achieve this carry out all tasks on the witness statement and complete the written tasks, upload these to Turnitin as evidence.

Software Utilities? 20

SUMMARY

Computer and networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals.

Effective security is based on a variety of products and services.

A Firewall controls traffic between networks and helps prevent unauthorized access.

Software Utilities? 21