100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

Essay Unit 9 - Computer Networks Assignment 4 Task 1

Rating
-
Sold
3
Pages
2
Uploaded on
18-11-2020
Written in
2019/2020

Essay Unit 9 - Computer Networks Assignment 4 Task 1.









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
November 18, 2020
Number of pages
2
Written in
2019/2020
Type
Essay
Professor(s)
Unknown
Grade
Unknown

Content preview

Unit 9 Assignment 4

Be able to make networked systems secure

Task 1
Passwords
Passwords are one of the most effective way to make systems secure, this is because of the
simplicity and security level they provide. A password can be a combination of letters
numbers and symbols, depending on the network system. Passwords are also beneficial as
they can detect unauthorised users, if a user inputs the wrong password more than a certain
amount of times the access is denied regardless. Another benefit of using passwords is that
they are easy to recover through the user’s email address, it only takes few minutes to
regain access to the network if a password is lost or stolen.

Authorisation permissions and access control lists
Authorisation permissions and access control lists are very powerful and useful settings
when protecting a network. These can be set on any kind of data and are mostly used in
businesses but also locally on home computers. To edit and change authorisation
permissions you have to access the server as an administrator, this means that you can
access all the data and set up different permissions for different users. In a business the
higher your rank is for the company the more data you will be able to access; this means
that a manager will be authorised to access data that a normal employee is not able to
access. Administrators can use access control lists to give access to other users depending
on the necessities in order to complete a task or do their job.

Backing up and restoring
Backing up and restoring is a very useful method to protect a network. All sensitive files
should be backed up either online or offline, backups can be stored on cloud storage offered
by organisations in exchange of monthly payments as well as in an external storage device
such as a hard disk drive. Backups are essential for a business as faults or mistake can often
occur and the business should be ready to deal with the loss of data at any time, if backups
are kept correctly any data loss won’t result in a major loss of money and time as all the
information will be restored. Backups are also helpful to prevent consequences of
unauthorised access, this means that if a hacker steals or deletes data, thanks to the
backups the organisation will be able to restore any file.

Encrypting
Encryption is the most powerful method of protecting data over a network, this means that
all the data and information flowing across the network will be turned into code that an
unauthorised user will not be able to understand even in case he is able to access it.
Encryption code is very hard to decrypt, and this is why it is used by the biggest organisation

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Siratt The Manchester College
View profile
Follow You need to be logged in order to follow users or courses
Sold
25
Member since
6 year
Number of followers
19
Documents
33
Last sold
2 year ago
Reliable Assignments

Trying to give you guys the help most of us didn\'t have.

3.7

3 reviews

5
0
4
2
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions