0% found this document useful (0 votes)
13 views12 pages

Com426 Module1

The document outlines essential topics in network security, including data backup, antivirus protection, and incident response. It details various backup methods, their pros and cons, and emphasizes the importance of disaster recovery plans. Additionally, it covers cyber attacks, log analysis, and system vulnerability identification, providing a comprehensive overview of network security fundamentals.

Uploaded by

gidadonaima472
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views12 pages

Com426 Module1

The document outlines essential topics in network security, including data backup, antivirus protection, and incident response. It details various backup methods, their pros and cons, and emphasizes the importance of disaster recovery plans. Additionally, it covers cyber attacks, log analysis, and system vulnerability identification, providing a comprehensive overview of network security fundamentals.

Uploaded by

gidadonaima472
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

1.

Understand Network Security Essentials


• DataData Backup
• Social Networking
• Antiviruses Protection
• Disaster Recovery
• Internet Security
• Credit Card Frauds
• Wireless & Home Network Security
• Bluetooth Security
• Smartphone Security
• Mobile Device Security
• OS Security

2. Understand Cyber Attack and Attack Analysis


• Explain Cyber Attack
• Explain how to Conduct Log Analysis.
• Explain how to Cross Examine for False Positives
3. Understand how to Perform Incident Response
• Explain Incident Response and its importance
• Explain an Incidence Response Plan
4. Understand how to Analyze Network Traffic
• Explain Network Monitoring
• Explain Network Traffic Analysis and how to Analyse Network
Traffic
• Explain Network Intrusion Detection
• Explain how to use Snort to detect intrusion
• Explain how to carryout
5. Understand how to Identify System Vulnerabilities
• Explain Vulnerability Assessment
• Explain the Importance of Vulnerability Assessment
• Explain the Types of Vulnerability Assessment
• Explain how to use OpenVAS
• Explain how to Identify System Vulnerabilities with OpenVAS
7. Understand Denial of Service (DoS) Attack, SQL Injection Attack and how to Recover from
it
• Explain Denial of Service (DoS) Attack
• Explain how to carry out a DDoS Attack
• Explain how to recover from DDoS Attack
• Explain SQL Injection Attack
• Explain how to carryout

8. Understand how to Conduct Log Analysis and Cross Examination for False Positives
• SQL injection attack
• Explain how to Recover fromSQL injection Attack
Explain How to Carryout Penetration Testing and Ethical Hacking

Course work Course test Practical Other


20% 20% (Examination/project/portfolio)
%
60%
Understand Network Security Essentials

Data Backup
What is Data Backup ?

A data backup is a copy or archive of the important information stored on your devices
such as a computer, phone, or tablet, and it’s used to restore that original information in
the event of a data loss,

When setting up a backup plan, you need to take into consideration the resources
available, as well as the amount of data you need to protect.

BCKUP APPLICATIONS

Name Free Storage Free Trial

Backblaze 5GB 15 Days

Carbonite No 15 Days

NAKIVO 15 GB 15 Days

Pcloud 10 GB 30 Days

PolarBackup 50GB 15 Days

1) Backblaze
Backblaze store your data on the cloud. It is simple, less costly, fast, and easy to use. The
tool allows unlimited storage. You can also use such software to backup your Mac or PC.
There are three versions of this software 1) personal backup, 2) business backup, and 3)
B2 cloud storage.
2) Carbonite
Carbonite provides the ultimate backup and recovery of data. Protect your data with
automatic cloud backup. This tool offers personal, business cloud backup solution.
Backup service is available to Windows as well as macOS users.

3) NAKIVO
NAKIVO Backup & Replication is a fast, reliable, and affordable solution for virtual,
physical, and cloud environments. The software offers the robust suite of enterprise-grade
data protection features for the price of an SMB solution.

4) Pcloud
Pcloud is secure and simple to use backup software for your documents. This tool allows
you to share and collaborate files with your employee, friends, and relatives.

5) PolarBackup
PolarBackup is an affordable and powerful Cloud backup solution. It provides an easy
and Intuitive System for Managing Data. This tool also allows you to set automatic
backups.

6) BDRSuite
BDRSuite is a complete backup & disaster recovery solution for your Virtual, Physical,
Cloud workloads & SaaS applications. Be it a small business running a few machines to
an enterprise having hundreds of servers, BDRSuite takes a comprehensive approach to
protect your data against a data loss or disaster. As a result, you can now experience an
intuitive & feature-rich backup from a centralized web console.

7) AOMEI
AOMEI Backupper is a fast and reliable PC backup tool. You can use this software to
backup, sync, and restore your data, applications, and Windows system. This software
available in two versions 1) home and 2) business.
💻 What are the methods to backup my computer?
You can backup your data to the external drive, backup over internet, or using cloud
storage services.

⚡ How does backup software work?


Backup software work as a safeguard your data when file corruption and hardware failure
occur.

⭐ What are the benefits of full backup?


The full backup helps you to restore your important data by reducing the chances of data
loss. Full backups contain all data so you can perform a complete restore from hard disk
or tape. On the contrary, incremental backups only have data about the new/modified
data since the last backup.

What is the importance of data backup in business?


Data backup is important to get protection from a data breach or cyber-attacks.

What are Backup Media?


Backup media refer to storage devices where people save electronic file backups,
sometimes for forensic investigations
Examples include:

• Disks
• Disk drives
• Tapes.
• Cloud

They don’t usually include CDs, DVDs, and USB flash drives where people store unique,
relevant files. But should disks and flash drives be used to store file copies, they can
serve as backup media, too.
For storage devices to be considered backup media, they need to contain copies of files
currently or formerly stored on devices. They are kept for several reasons, primarily
avoiding data loss in case of device failure. Should investigators need evidence on a
suspect, all of the files on backup media can serve as sources, too.

Cloud storage as a backup media is probably the most flexible in capacity. Users can get
as little as 15GB of Google Drive capacity to as much as 750GB. iCloud offers between
5GB and 4TB storage capacities. Data centers can offer large enterprises as much
capacity as they require so long as they can afford the cost.

Given the flexibility of cloud storage, it can be considered both small- and large-capacity
storage. It all depends on a user’s needs.

Types of backup
1. Full Backup
2. Incremental Backup
3. Differential Backup

Full Backups
A full backup involves copying the entire data set of the system into a separate partition or
onto an external disk.
Because it creates a full copy of the specified data volume, it requires a lot of free disk
space where the copy can be stored. What’s more, doing a backup of the entire system
takes up a lot of time and is not practical on a daily basis.
Therefore, most companies schedule full backups on a daily, weekly, or biweekly basis,
running incremental or differential backups in between. The frequency of full backups
mainly depends on the size of the company.
For instance, a mid-sized company may set up daily backups of the entire data volume
from Monday to Friday. In that case, their backup plan would appear as in the following
image:

Pros and Cons of Full Backups


PROS:

1. Provides the best protection in terms of data recovery


2. Fast recovery of data in a single backup set

CONS:

1. Backup is time-consuming
2. Requires more storage space
3. Uses up a lot of bandwidth

Incremental Backups
An incremental backup is a resource-friendly alternative to full backup. Such a setup is
designed only to back up data that has changed since the previous backup. Therefore, it
exclusively saves data that has been modified or added to the existing data volume.
For a closer look at how incremental backups work, let’s use a simple example.
A smaller-sized company that doesn’t require full backups daily can set up incremental
backups between two full backup occurrences.
An administrator can arrange a full backup of the data set on Monday and then incremental
backups between Tuesday and Friday. Therefore, on Tuesday, it creates copies of any
changes that have been made since Monday. Next, on Wednesday, it will back up any
changes made since Tuesday, and so on.
As a result, the weekly backup will consist of one full backup along with several smaller
backup sets. This method is efficient as it takes up less space on the system. Also, since the
sets are smaller compared to the volume set, they take less time to back up.

Pros and Cons of Incremental Backups

PROS:

1. Smaller backups that take up less storage space


2. Faster to backup
3. Uses less bandwidth

CONS:

1. Time-consuming to recover
2. Risk of failed recovery if there is damage to a segment in the backup chain

Differential Backups
A differential backup is similar to incremental as it relies on a full backup, followed by
saving only the changes made on that source volume.
However, it differs in the way these changes are saved. While incremental backups save
all changes made since the last backup, differential backups save changes made since the
last full backup.
With such a setup, the backup sets do not rely on each other, but rather on the full backup
they stem from. As they only consist of two backup sets, their recovery time is much better.
This provides better data protection and a valid disaster recovery solution.
In the following example, you see a five-day incremental backup plan. It starts with a full
backup on Monday. On Tuesday, it saves only the changes made on the data source. On
Wednesday, the backup set consists of all the changes made from Monday to Wednesday.
The same procedure is applied on Thursday and Friday.

While this method is faster to restore, it does take some time to back up and requires
more storage space than an incremental backup.

Pros and Cons of Differential Backups

PROS:

1. Faster to restore as it only has two backup sets


2. Faster to back up compared to full backups
3. Takes up less space than full backups

CONS:

1. Takes up more space than incremental backups


2. Slower to back up compared to incremental backups
You should now have a good understanding of the three basic types of backups. As you
have seen, each one has its own benefits and drawbacks. Therefore, setting up your backup
plan with one or the other will depend on your needs, priorities and resources.

What is Social Networking?


Social networking is an online platform that people uses to develop a social relationship
with others with similar thoughts and personal interest, backgrounds, real-time connections
or career activities. There are several social media networking sites for instant messaging,
sharing or posting views, and much more.

1. List the various social networking channels and application


2. Discuss extensively their merits to individual and groups of interest group

Antiviruses Protection

Who Needs Antivirus Software?


These days, everybody needs antivirus software. Computer viruses don’t just come from
streaming or downloading movies. Many people think that they can avoid potential threats
by making sure they don’t visit certain websites or download certain files. The truth is
computer viruses can make their way onto your computer or any other device in a number
of ways. You can pick up viruses and malware simply by checking your email, browsing the
web or from putting a USB memory stick into your laptop. Virus protection is a necessary
factor of having your own personal computer. Luckily for you, there are hundreds of choices
of antivirus software – each with its pros and cons.

How Antivirus Works


Most antivirus software works on a signature database, monitoring the internet 24 hours a
day, 7 days a week. Every time a new virus is reported – it’s indexed, catalogued and
added to the software’s database. Once your antivirus software is up-to-date it is equipped
to tackle the new virus should it ever reach your device.

How to Handle Viruses


You often have three options when faced with a threat on your computer: delete the threat,
quarantine it or ignore it.
Deleting is almost always the best option, but some viruses make themselves "un-deletable"
and quarantining becomes your only option. Your quarantine folder will keep the virus
isolated and prevent it from spreading or causing damage to other files. Antivirus software
can be passive or active – passive requires you to make scheduled or manual virus scans,
while active runs in the background; detecting and fighting threats in real-time.
Free vs Paid Antivirus Software
If you are deciding on a new antivirus software and may want to try a free version, keep in mind that
there are pros and cons for both paid and free versions. Using a free antivirus software can cost
you more in the long run and most experts suggest that it’s better to use a paid version. Free versions
can be great to try a new software or set of features, but will never provide the same level of
protection - and your service most certainly won’t include internet security software.
Paid versions of antivirus software will cover both online and offline activities, permanently
delete sensitive digital files and provide extra encryption to protect your most private files
from malware like Trojans, worms and ransomware.
A paid antivirus software is especially helpful if you have a PC or device that has already
been infected. Many paid versions offer virus removal and cleanup tools, in addition to the
highest-quality prevention and detection rates.
Extra Features
There are a few key features that you should look out for when looking for antivirus software,
and it will vary depending on your needs.
➢ Online Protection - If you’re online, then you probably want an internet security
software with a built-in firewall.
➢ Email Protection - If you’re a heavy email user then you’ll want be on the lookout
for anti-spam, spyware and phishing.
➢ Parental Controls - Parents need to look for software with easy-to-use parental
controls and restrictions.
➢ Gaming Protection - Gamers can look forward to a "gaming mode," which
prompts the internet security software to use less resources.
➢ Compatibility - You will want to check the compatibility of your chosen software
with your operating system, whether that be Windows protection, Mac OS
antivirus and everything in between.

Assignment:

Disaster Recovery
Group Project (Group the class into 10 TEN) 10 Marks
1) What is an IT disaster recovery plan?
2) What should a disaster recovery plan include?
3) What are the Benefits of a disaster recovery plan
4) How can you develop a disaster recovery plan?

You might also like