Identifying and preventing vulnerabilities - Network security - OCR - GCSE Computer Science Revision - OCR - BBC Bitesize (2024)

Identifying and preventing vulnerabilities

One of the roles of the manager is to ensure the network is safe from attacks and threats of any kind. There are many techniques that can be used to help keep a network safe, including:

  • secure

The purpose of penetration testing is to determine how a network is against an attack. It involves authorised users (sometimes an external party or organisation) who probe the network for potential weaknesses and attempt to exploit them. that enables network managers to test the resilience of networks themselves is also available.

Network forensics

Network forensics involves monitoring the traffic on a network. At regular intervals transmitted packets are copied. The copy and information about the packet are then stored for later analysis. This is usually processed in batches. The information gathered can help identify invasive traffic (from hackers) or to determine where data is being sent.

Network policies

Users of a network are often the source of threats, whether accidental or deliberate. A network manager should have an acceptable use policy which ensures:

  • users have a secure, hard-to-guess password which meets specified conditions
  • users change their password on a regular basis
  • users cannot connect unauthorised equipment to the network, such as USB memory sticks, smartphones and tablets
  • levels of access are given, which allow only authorised users to access sensitive data
  • a regular procedure is in place
  • a disaster recovery procedure exists in case of data loss
  • regular penetration testing and forensic analysis
  • regular maintenance including applying software upgrades and security to equipment
  • preventing physical access to servers
  • maintaining a high level of security with up-to-date and firewalls

User access levels

Access levels determine the facilities a user has access to, such as:

  • software
  • email
  • internet access
  • documents and data
  • the ability to install and/or remove software
  • the ability to maintain other users' accounts

A network manager should make sure users can only access the facilities they need. For example, an office worker might need access to productivity software, email and the internet, but not to install software or access other users' accounts. Restriction limits the actions a user can take, thereby reducing the potential of threats.

Identifying and preventing vulnerabilities - Network security - OCR - GCSE Computer Science Revision - OCR - BBC Bitesize (2024)
Top Articles
Question 10 of 15 What can quantum computers
Accept International Payments from India
Bank Of America Financial Center Irvington Photos
Tattoo Shops Lansing Il
Cranes For Sale in United States| IronPlanet
Skyward Sinton
Libiyi Sawsharpener
Ffxiv Palm Chippings
Kraziithegreat
Did 9Anime Rebrand
Gameday Red Sox
Goteach11
MADRID BALANZA, MªJ., y VIZCAÍNO SÁNCHEZ, J., 2008, "Collares de época bizantina procedentes de la necrópolis oriental de Carthago Spartaria", Verdolay, nº10, p.173-196.
Cvs Devoted Catalog
Delectable Birthday Dyes
Rosemary Beach, Panama City Beach, FL Real Estate & Homes for Sale | realtor.com®
Colts seventh rotation of thin secondary raises concerns on roster evaluation
Industry Talk: Im Gespräch mit den Machern von Magicseaweed
Rainfall Map Oklahoma
Kitty Piggy Ssbbw
Petco Vet Clinic Appointment
Invitation Homes plans to spend $1 billion buying houses in an already overheated market. Here's its presentation to investors setting out its playbook.
Orange Pill 44 291
The Ultimate Guide to Extras Casting: Everything You Need to Know - MyCastingFile
Boston Dynamics’ new humanoid moves like no robot you’ve ever seen
Directions To Cvs Pharmacy
Ihub Fnma Message Board
Cb2 South Coast Plaza
Access a Shared Resource | Computing for Arts + Sciences
Maine Racer Swap And Sell
Taylored Services Hardeeville Sc
Cvs Sport Physicals
The Bold and the Beautiful
Storelink Afs
Elisabeth Shue breaks silence about her top-secret 'Cobra Kai' appearance
The Transformation Of Vanessa Ray From Childhood To Blue Bloods - Looper
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Craigslist Mexicali Cars And Trucks - By Owner
11301 Lakeline Blvd Parkline Plaza Ctr Ste 150
Jasgotgass2
Gfs Ordering Online
The Angel Next Door Spoils Me Rotten Gogoanime
Setx Sports
Courtney Roberson Rob Dyrdek
John M. Oakey & Son Funeral Home And Crematory Obituaries
From Grindr to Scruff: The best dating apps for gay, bi, and queer men in 2024
Vci Classified Paducah
Dayton Overdrive
Lightfoot 247
Wvu Workday
Costco Tire Promo Code Michelin 2022
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 6229

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.