Exercise 12 Revision Configure and administer network operating system

snottysurfsideΔιακομιστές

9 Δεκ 2013 (πριν από 3 χρόνια και 6 μήνες)

71 εμφανίσεις

Exercise 12 Revision


Configure and administer network operating system


1.

When any site requests information about you, what questions should you ask?



Is this site protected?



Is it the official site?



Why do they need all of this information?



Does the site l
ook professional?


2.

Complete the self assessment quiz at:


http://www.staysafeonline.info/content/self
-
assessment
-
quiz


3.

What sort of things can you do to protect your business?



Anti

virus software



Firewalls



User names and passwords

Visit
Tools & Resources

and the sites below and advise if your computer is vulnerable to a cyber
attack?



Many comput
er security vendors offer free computer security checks for your computer. Visit a link
below to check your computer for known viruses, spyware, and more and discover if your computer is
vulnerable to cyber attacks.

http://daol.aol.com/security/computer
-
checkup


http://www.auditmypc.com


http://www.bitdefender.com/scan8/ie.html


http://shop.ca.com/STContent/Resources/Resources.aspx


http://onecare.live.com/site/en
-
us/default.htm?s_cid=sah


http://www.kaspersky.com/virusscanner


http://us.mcafee.com/root/mfs/default.asp


http://www.pandasecurity.com/activescan/index/?track=1&Lang=en
-
US&IdPais=63


http://www.symantec.com/securitycheck


http://housecall.trendmicro.com/housecall/start_corp.asp

4.

Just over the last
year, the kinds of vulnerabilities that are being exploited are
very different from the ones being exploited in the past. What are the main ones,
give a short explanation of each.


JPEG Vulnerability

This infection requires only that the person to view the

image. Even the simple process
of loading a website with an infected JPEG is enough for you to be infected if you
haven't correctly patched this vulnerability.


5.

The brightest minds in technology and government are finding it "almost
impossible" to defeat
the
Conficker worm
, why is this so? Explain.


People who wipe their computers clean and start fresh, if they back up any important
data on a portable hard drive, the clean machin
e is reinfected when the drive is
connected to the computer.

The worm also spreads automatically between computers on a network and infects
machines without the user having to do anything other than switch their computers on.


6.

What are the top consideratio
ns for implementing secure backup and recovery?
Is there a strong authentication of backup server and backup clients?



Is there encryption on a client for securing data in transit?



Is there encryption on a backup server for securing data on a backup
media, e.g.
tape?



Can you choose between different encryption methods and take advantage of new
encryption algorithms?



Is there role
-
based access control for administration, backup and recovery?



Can you open just a few ports (ideally only one p
ort) for backup through a firewall?



Is there support for SELinux?



Did you verify security of backup software configuration files that store passwords for
file
-
, database
-

and application servers?



Did you verify that US
-
CERT has no alerts about
your backup software?



Are there independent reports about quality and security of code for your backup
software?



7.

Explain an internet backup service. What would you recommend and why?

Give references to independent reviews.

An internet backup allows

you store you files as well as back up your internet files.

I recommend Carbonite.
Reviewers say Carbonite is one of the best online backup
services when it comes to ease of use and simplicity. The initial backup may be
somewhat slow, depending on how man
y files you have, but subsequent backups go
faster and the service runs unobtrusively in the background. Reviewers also like the file
markings that clearly illustrate the backup status of each file on your computer.
Carbonite online backup supports PC and
Mac platforms

http://www.consumersearch.com/online
-
backup
-
services/carbonite#1

http:/
/www.consumersearch.com/online
-
backup
-
services/carbonite#2

http://www.consumersearch.com/online
-
backup
-
services/carbonite#3


8.

Give some recommendations of how college stu
dents can stay safe online.

Use programs like Norton to keep you safe while your surf the net. It allows you to prevent you
from accessing web pages that could have potential threats that could cause harm to your
computer.


9.

How would you best filter intern
et access?

By having separate accounts that have different protection rights,e.g. Teacher have access to
all content and students have parental rights on there accounts so they cant access
inappropriate sites and they can concentrate on the work that needs

to be done.


Also the use of proxy servers can prevent inappropriate material from being accessed through
out the internet. This can also be updated regularly.




References:

http://www.staysafeonline.info/

http://www.staysafeonline.info/content/protect
-
your
-
business

http://www.smh.com.au/technology/security/internet
-
meltdown
-
threat
-
conficker
-
worm
-
refuses
-
to
-
turn
-
20090922
-
fzlh.html





















References:

Attached resources.

Tutorial

ht
tp://en.wikipedia.org/wiki/Cloud_computing


Networking Essentials, 2008


Help and Support Centre


www.google.com


www.wikipedia.com



w
ww.answers.com