CSS 10 - Lesson 3
CSS 10 - Lesson 3
CSS 10 - Lesson 3
SECURITY
Quarter 4 – Lesson 3
You need to understand computer and network
security. Failure to implement proper security
procedures can affect users, computers, and the
general public. Private information, company
secrets, financial data, computer equipment, and
ítems about national security are placed at risk if
proper security procedures are not followed.
Computer and network security help keep data
and equipment safe by giving only the
appropriate people Access. Everyone in an
organization should give high priority to
security, because everyone can be affected by
a breach in security.
An attack that intentionally degrades the
performance of a computer or network can also
harm an organization’s productivity. Poorly
implemented security measures that allow
unauthorized Access to Wireless network devices
demonstrate that physical connectivity is not
necessary for security breaches by intruders.
How man in the middle attacks
work
SECURITY
ATTACKS
To successfully protect computers and the
network,
a technician must understand both of the
following types of threats to computer
security.
0
PHYSICAL
1 Events or attacks that steal, damage,
or destroy such equipment as servers,
switches and wiring.
0
DATA
2 Events or attacks that remove,
corrupt, deny Access to, allow
Access to, or steal information.
THREATS TO SECURITY CAN
COME FROM INSIDE OR
OUTSIDE AN ORGANIZATION,
AND THE LEVEL OF
POTENTIAL DAMAGE CAN
VARY GREATLY. POTENTIAL
THREATS INCLUDE THE
INTERNAL: Employees who have
FOLLOWING:
Access to data, equipment, and the
network.
Internal attacks can be characterized as
follows: