Unauthorised Access

Cards (8)

  • Unauthorized access entails approaching, trespassing within, communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent
  • Unauthorized access can be internal or external
  • By the end of this session you should be able to explain the purpose and features of:
    • Physical security
    • Biometric security
    • Password policies
    • Access control lists
    • Backup and restore procedures
    • Firewall and AV protection
    • and how they may be used in local and wide area networks
  • Biometrics
    Physical and biometric security measures that can be used to protect networks
  • Password policies
    How network managers can enforce password security
  • Access Control Lists (Permissions)

    Associated with file sharing and permissions
  • Backup & Restore
    1. Technologies that can be used for data backup
    2. What needs to be backed up on a network
    3. How often to backup
    4. Backup destinations
  • Wireless networks
    Security options for WiFi networks