1 Unit 2 Assignment 2 - Herefordshire and Ludlow...

21
Unit 2 – Assignment 2 Software Utilities? 1

Transcript of 1 Unit 2 Assignment 2 - Herefordshire and Ludlow...

Page 1: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

Unit 2 – Assignment 2

Software Utilities?

1

Page 2: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

OBJECTIVES

Identify software utility types and examples of common software

Why are software utilities used?

Identify and describe the various networking threats.

Identify different methods of attack.

Describe the features of a firewall and how it can be used to protect against an attack.

Software Utilities? 2

Page 3: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

SOFTWARE UTILITIES?

Can be defined as

“A broad range of system software designed to help gather information, configure, optimise and maintain a Computer System”.

Software Utilities? 3

Page 4: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

EXAMPLES OF SOFTWARE UTILITIES?Firewall

Virus protection

Clean up tools

Drive Formatting/compression

Software Utilities? 4

Page 5: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

TASK

Software Utilities? 5

Task 1 - research the following tools

1. Firewall

2. Virus protection

3. Clean up tools

4. Drive Formatting/compression

Task 2 - Why do we use each of these tools? What are their functions

What are the strengths and weaknesses

Page 6: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

THE PURPOSE OF GIVEN SOFTWARE UTILITIESFirewall

Monitor and control traffic to and from a computer system

Virus protection Monitor the computer system to prevent, detect

and remove malware

Clean up tools Removes cookies and temporary files

Drive formatting /Compression Prepare a hard disk for use, provide a File System

Shrink the disk space used by a partition

Software Utilities? 6

Page 7: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

POTENTIAL NETWORK THREATS Describe risks of network intrusion

Software Utilities? 7

Page 8: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

NETWORKING THREATS Define the sources of network intrusion.

Software Utilities? 8

Page 9: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

NETWORKING THREATS Describe social engineering and phishing

Example

Software Utilities? 9

Page 10: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

METHODS OF ATTACK Describe viruses, worms, and Trojan horses.

Virus

Worm

Trojan Horse

Software Utilities? 10

Page 11: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

METHODS OF ATTACK

Describe viruses, worms, and Trojan horses.

Virus – Requires a Host to spread.

Worm – Able to Self replicate.

Trojan Horse - Comes in disguised as agenuine software or added to genuine software.

Software Utilities? 11

Page 12: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

METHODS OF ATTACK Denial of Service and Brute Force attacks

Software Utilities? 12

Page 13: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

OTHER MALWARE Spyware

Tracking cookies

Adware

Popup

Task – Determine the difference between these.

Software Utilities? 13

Page 14: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

SPAM

Unsolicited email

Typically commercial

1. Dictionary attacks

2. Search the Internet

And web pages for @ sign.

3. Gained from newsgroups and chat rooms

Commercial business exist offer a spamming service

Anti Spam software

Software Utilities? 14

Page 15: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

SECURITY PROCEDURES AND APPLICATIONS Define common security procedures

Software Utilities? 15

Page 17: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

FIREWALL FEATURES AND HOW TO USE THEM TO PROTECT AGAINST AN ATTACK

What is a firewall?

Hardware/Software

PC or router based

One or two way?

Software Utilities? 17

Page 18: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

LAYERS WITH TCP/IP AND OSI MODEL

Software Utilities? 18

The firewall operates within

the TCP/IP layers.

Monitors and blocks based on

Port numbers (OSI Layer 4)

Page 19: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

APPLICATIONS AND LINKS TO PORT NUMBERS

Application layer name Port number

• DNS 53

• EMAIL 25,110,143

• FTP 21

• Web Server 80

Packet Tracer exercise

Stud share week 6

Software Utilities? 19

Page 20: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

FIREWALL TASK

Assignment 2 - Outcome P8 will be carried out within this assignment evidenced by witness statement.

To achieve this carry out all tasks on the witness statement and complete the written tasks, upload these to Turnitin as evidence.

Software Utilities? 20

Page 21: 1 Unit 2 Assignment 2 - Herefordshire and Ludlow Collegewiki.hct.ac.uk/_media/computing/btec/level3/lesson12... · 2014-10-22 · FIREWALL TASK Assignment 2 - Outcome P8 will be carried

SUMMARY

Computer and networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals.

Effective security is based on a variety of products and services.

A Firewall controls traffic between networks and helps prevent unauthorized access.

Software Utilities? 21