Upload
jonathan-wood
View
219
Download
1
Tags:
Embed Size (px)
Citation preview
NETWORKS
By : Nicolas Pottier
Electronic security
Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel using computers.
Example : BiometricsExample : Password
Licences
When users are authorised to use technology legally according to the Operator’s terms and conditions. Example : Concurrent licensing(Purchased by one user but can be given to third parties.)
Example : Single user licensing(Purchased by one user and can only be used by that person.)
Physical security
Physical barriers and controls that protect resources from any accidental or deliberate threats.
Example : VaultsExample : Locks
Monitoring
Keeping surveillance on and/or recording the emissions of a user in order to maintain security or for system improvements.
Example : Keystroke monitoring Example : system performance
Network policiesSets of conditions, constraints, and settings that indicate to users how they can or cannot manipulate the network.
Example : Disaster recovery(Recovering resources from a critical state due to human or natural disasters.)
Example : Archiving data
Codes of ethics and professional conduct
Guidelines written by an organization to workers, helping them conduct their actions in accordance with its primary values and ethical standards.
Example : The Association for Computing Machinery (ACM)
Data centres
A facility used to house computer systems and other component systems.
Example : Google server
Energy usage
The energy consumption when the technology is at a full potential and working efficiently, day in and day out.
Example : Uninterruptible power supply(capability of switching to a back up generator in the circumstance that there is a power cut, therefore no power interruption)
Back- up generator
THANK YOU!