In: Computer Science
Fill up the blanks
Transmission |
Original |
Firewalls |
Verification |
Sensitive |
Share |
Hackers |
Appropriate |
Backup |
Data |
Safeguards |
Networks |
User identification |
Confirm |
ID |
Perform |
Connecting |
Data encryption |
Intercepted |
Decryption |
Password |
Logon security |
Unauthorised |
Encrypted |
Access controls |
Magnetic |
Immediate |
Access |
Previous |
Medium |
Inexpensively |
Tape |
Item |
Server |
Crash |
Essential |
Back ups |
Rebuild |
Recovery |
Implementing |
Barriers |
Anti-virus software |
Infected |
Virus |
Minimised |
A network aims to _________________ resources and provide communication for users. It provides an opportunity for _______________ to access data. Network security requires careful planning and needs constant review to ensure procedures are ________________. Security of information involves storage, ________________ and data security.
Networks are required to store huge quantities of _______________. Storage involves using _______________ disk and magnetic tape. Magnetic disk storage is used when _________________ immediate access to data is required. It uses direct ___________. This form of access allows data to be found directly without accessing all the ______________ data. Magnetic tape is used as a back up _______________. It can store large quantities of data ________________. Magnetic ____________ uses sequential access. This form of access starts at the beginning of the tape and reads all of the data until the required ______________ is found.
Network users are encouraged to store important files on the __________________. However, a server is exposed to many risks such as a ______________, theft or circuitry failure. Regular backups of data stored on the server are _______________. A backup is another copy of the data that could be used to _____________ the system. _____________ are sent to a warehouse storage facility through the Internet or secured off site. If the system goes down the ______________ process rebuilds the system. The success of backup and recovery depends on implementing appropriate procedures.
Data security is a series of _____________ to protect data. There is a range of security techniques that apply to networks:
__________________ is used to scan the network for a range of well-known viruses. Data _____________ by a virus is often costly to repair or impossible to replace. There is no guarantee that anti-virus programs will stop every __________ as new viruses are always appearing. However, if the network uses the latest virus definition files and regularly uses the anti-virus program problems will be ______________.
The solutions are bold and underlined as given below:
-----------------------------------------------------------------------------------------------------------------------------
A network aims to share resources and provide communication for users. It provides an opportunity for hackers to access data. Network security requires careful planning and needs constant review to ensure procedures are appropriate. Security of information involves storage, backup and data security.
Networks are required to store huge quantities of data. Storage involves using magnetic disk and magnetic tape. Magnetic disk storage is used when immediate access to data is required. It uses direct access. This form of access allows data to be found directly without accessing all the previous data. Magnetic tape is used as a back up medium. It can store large quantities of data inexpensively. Magnetic tape uses sequential access. This form of access starts at the beginning of the tape and reads all of the data until the required item is found.
Network users are encouraged to store important files on the server. However, a server is exposed to many risks such as a crash, theft or circuitry failure. Regular backups of data stored on the server are essential. A backup is another copy of the data that could be used to rebuild the system. Backup are sent to a warehouse storage facility through the Internet or secured off site. If the system goes down the recovery process rebuilds the system. The success of backup and recovery depends on implementing appropriate procedures.
Data security is a series of safeguards to protect data. There is a range of security techniques that apply to networks:
User
identification is the ability to identify the user
to the network and to confirm their
identity. A user is identified by entering a user ID and
confirms their identity by entering a valid password. A
password
is secret words or numbers that are typed on the keyboard to gain
access to the system.
Logon security
involves protecting user ID and passwords from unauthorised
access. The password file should be encrypted and
secured.
Access
controls restrict users or a group of users to
those files and resources they need to perform their
job. When connecting to
a network a certain level of access is granted. This is done during
the process of logging on.
Data
Encryption is used to prevent data
from being intercepted
during transmission. Encryption is the process of coding data and
decryption is
the process of changing the data back. It is the most effective way
to achieve data security during the transmission
of data. Data is coded, transmitted, and then converted back to its
original
form.
Firewalls are
used on a network to check all incoming data for the purpose of
verification
and authentication. A firewall aims to protect the network from
hackers trying to access sensitive
information. Large networks have more than one firewall because
barriers need
to be placed at all critical points.
Anti-virus software is used to scan the network for a range of well-known viruses. Data infected by a virus is often costly to repair or impossible to replace. There is no guarantee that anti-virus programs will stop every virus as new viruses are always appearing. However, if the network uses the latest virus definition files and regularly uses the anti-virus program problems will be minimised.