Upload
osborne-poole
View
216
Download
0
Embed Size (px)
Citation preview
Key W
ord
s
Investigating measures to control security risks
Ao2
Think / Pair / Share
Answer the following question
“What reasons would someone want to harm a website”
Pass
Merit
Distinction
Controlling Access
• How do we control access here at St Johns?
Register all users!
• Around 150 staff and 1500(ish) students, each have their own unique access.
• Stops people “borrowing” other peoples logins and gives unique accountability to actions on the network.
Password Access
• Allows unique user id’s to remain unique to the user.
Levels of AccessLevel of Access Name Job Title Responsibility
High G.Moran Headteacher Whole School
Medium / High G.McIntyre Subject Learning Co-Ordinator
Whole Department
Medium L.Willis / L.Chambers
Teachers of ICT Department / Pastoral Group
Medium / Low N/A Student Teacher Individual Groups
Low N/A Student Self
Why do we have different levels of access for different people?
Today's Outcomes
• Glogster – Interactive Posters! • Create one going into huge detail
regarding two of these problems!
Pass
• Candidates demonstrate a basic understanding, supported with few examples, of four valid measures, covering hardware and software that a website controller could use.
Merit
• Candidates demonstrate understanding, supported with appropriate examples, of the effectiveness of six valid measures, covering hardware, software and procedures that a website controller could use.
Distinction
• Candidates demonstrate understanding, supported with a variety of well chosen examples, of the effectiveness of eight valid measures, covering hardware, software and procedures that a website controller could use.
Web Controller
• Web / Network Police
Hacking Nerd
• Good and Bad Intentions
• Want access to either damage or highlight shortcomings.
How can they be stopped
• Website controllers have three methods of protection– Software– Hardware– Procedural
Software
• Firewalls• Virus checker• Virus definition• Encryption (Public-key, Pretty
Good Privacy, digital signatures)
• Anonymisers• Remailers
Hardware
• Quarantine machine
Procedures
• passwords• machine id• activity monitoring• backup procedures• restore procedures
Today's Format
• A web controller can stop accessing to his website using .....– It works by– He uses it because– Its advantages are– Its problems are
Three Teams
Software
Procedures
Hardware
• Your going to answer these questions to the class in 60 minutes!
Outcomes
• You have the choice! – An instructional video to Web Controllers
advising them on how to stop this.– A series of Posters demonstrating your
advise– Anything you can reccomend!