10
NETWORKS By : Nicolas Pottier

NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel

Embed Size (px)

Citation preview

Page 1: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel

NETWORKS

By : Nicolas Pottier

Page 2: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel

Electronic security

Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel using computers.

Example : BiometricsExample : Password

Page 3: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel

Licences

When users are authorised to use technology legally according to the Operator’s terms and conditions. Example : Concurrent licensing(Purchased by one user but can be given to third parties.)

Example : Single user licensing(Purchased by one user and can only be used by that person.)

Page 4: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel

Physical security

Physical barriers and controls that protect resources from any accidental or deliberate threats.

Example : VaultsExample : Locks

Page 5: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel

Monitoring

Keeping surveillance on and/or recording the emissions of a user in order to maintain security or for system improvements.

Example : Keystroke monitoring Example : system performance

Page 6: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel

Network policiesSets of conditions, constraints, and settings that indicate to users how they can or cannot manipulate the network.

Example : Disaster recovery(Recovering resources from a critical state due to human or natural disasters.)

Example : Archiving data

Page 7: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel

Codes of ethics and professional conduct

Guidelines written by an organization to workers, helping them conduct their actions in accordance with its primary values and ethical standards.

Example : The Association for Computing Machinery (ACM)

Page 8: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel

Data centres

A facility used to house computer systems and other component systems.

Example : Google server

Page 9: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel

Energy usage

The energy consumption when the technology is at a full potential and working efficiently, day in and day out.

Example : Uninterruptible power supply(capability of switching to a back up generator in the circumstance that there is a power cut, therefore no power interruption)

Back- up generator

Page 10: NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel

THANK YOU!