Back to 课程

Computer Science GCES EDEXCEL

0% Complete
0/0 Steps
  1. Decomposition And Abstraction Edexcel
    2 主题
  2. Algorithms Edexcel
    11 主题
  3. Truth Tables Edexcel
    3 主题
  4. Binary Edexcel
    6 主题
  5. Data Representation Edexcel
    4 主题
  6. Data Storage And Compression Edexcel
    2 主题
  7. Hardware Edexcel
    5 主题
  8. Software Edexcel
    3 主题
  9. Programming Languages Edexcel
    2 主题
  10. Networks Edexcel
    7 主题
  11. Network Security Edexcel
    2 主题
  12. Environmental Issues Edexcel
    1 主题
  13. Ethical And Legal Issues Edexcel
    3 主题
  14. Cybersecurity Edexcel
    2 主题
  15. Develop Code Edexcel
    6 主题
  16. Constructs Edexcel
    4 主题
  17. Data Types And Data Structures Edexcel
    5 主题
  18. Operators Edexcel
    1 主题
  19. Subprograms Edexcel
    2 主题
课 Progress
0% Complete

Exam code:1CP2

Access Control

What are access controls?

  • Access controls ensure users of a network can access what they need to access and do not have access to information/resources they shouldn’t

  • Users can have designated roles on a network

  • Some examples of different levels of access to a school network include

    • Administrators: Unrestricted – Can access all areas of the network

    • Teaching Staff: Partially restricted – Can access all student data but cannot access other staff members’ data

    • Students: Restricted – Can only access their own data and files

  • Users and groups of users can be given specific file permissions

What are file permissions?

  • File permissions can be set to determine different levels of access to specific files/folders

  • Examples of file permissions include:

    • Read – can read the contents of a file only

    • Write – can make changes to file contents and/or create new files

    • Delete – can delete files

    • Execute – can run applications/launch software

What is authentication?

  • Authentication is the process of ensuring that a system is secure by asking the user to complete tasks to prove they are an authorised user of the system

  • Authentication is done because bots can submit data in online forms

  • Authentication can be done in several ways, these include

    • Usernames and passwords

    • Multi-factor authentication

    • CAPTCHA – see example below

authentication-recaptcha

Physical Security

What is physical security?

  • Physical security is a method of physically preventing access to any part of a network

  • There are a range of physical security measures that can be implemented on a network

    • Locked doors: Preventing access to server rooms and cabinets of switches

    • Biometrics: Fingerprint scanners, facial recognition and retinal scans 

    • Surveillance Cameras: Monitoring the activity around the site where crucial networking hardware is located

What form of attack would this prevent?

  • Data interception and theft

  • Social engineering

Firewalls

What is a firewall?

  • A firewall monitors incoming and outgoing network traffic and uses a set of rules to determine which traffic to allow

  • A firewall prevents unwanted traffic from entering a network by filtering requests to ensure they are legitimate

  • It can be both hardware and software and they are often used together to provide stronger security to a network

    • Hardware firewalls will protect the whole network and prevent unauthorised traffic

    • Software firewalls will protect the individual devices on the network, monitoring the data going to and from each computer

What form of attack would this prevent?

  • Hackers

  • Malware

  • Unauthorised Access to a Network

Worked Example

Describe how a firewall protects a local area network (LAN) [2]

Answer

A description to include two from:

  • Monitors/checks traffic (1) using a set of rules / list of authorised/unauthorised computers/addresses/protocols (1) to decide if data is allowed into or out of the network (1)

Responses

您的邮箱地址不会被公开。 必填项已用 * 标注