MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files...
-
Upload
aldous-edwards -
Category
Documents
-
view
219 -
download
5
Transcript of MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files...
![Page 1: MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649eda5503460f94be971a/html5/thumbnails/1.jpg)
MMTK
Access control
![Page 2: MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649eda5503460f94be971a/html5/thumbnails/2.jpg)
Session overview
• Introduction to access control
• Passwords– Computers
– Files
– Online spaces and networks
• Firewalls
![Page 3: MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649eda5503460f94be971a/html5/thumbnails/3.jpg)
Introduction
• Access control is about ensuring that information is– Accessible to those who are authorized to see it– Not accessible to others
• In general, do not prevent access to information without good reason
• Main type of access control are passwords and firewalls.
![Page 4: MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649eda5503460f94be971a/html5/thumbnails/4.jpg)
Passwords
• Used for authenticate access• Not infallible, but an important basic
step• Use passwords to secure
– Computers– Files– Online spaces– Networks
![Page 5: MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649eda5503460f94be971a/html5/thumbnails/5.jpg)
Password tips• Don’t reveal your password to anyone else• Don’t use personal information as a password• Best to choose a random sequence of alphanumeric
characters not less than six characters long, using both upper and lower case character, e.g. KH92hw
• Never use sequential passwords (such as the names of days or months)
• Don’t reuse passwords (or at least not within a year or two)
• Change your passwords immediately if you think someone else has had access to them
• Never use the same password more than once on the same system
![Page 6: MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649eda5503460f94be971a/html5/thumbnails/6.jpg)
Firewalls
• Firewalls are hardware and software tools which – Prevent unauthorized access to and from
computers via the internet– Restrict access to particular services or
programmes
• “Good” traffic can move freely; “bad” traffic is kept out
• ANY computer or network which is connected to the internet should be firewalled