9
1 AQA ICT AS Level © Nelson Thornes 2008 1 AQA ICT AS Level © Nelson Thornes 2008 Firewalls and Virus Checkers

1 AQA ICT AS Level Nelson Thornes 2008 1 Firewalls and Virus Checkers

Embed Size (px)

DESCRIPTION

3 AQA ICT AS Level © Nelson Thornes They work by: Allowing all traffic unless it does not meet certain criteria. Allowing no traffic unless it meets certain criteria. Basic criteria could be: nature of the data source of the data Firewalls

Citation preview

Page 1: 1 AQA ICT AS Level  Nelson Thornes 2008 1 Firewalls and Virus Checkers

1AQA ICT AS Level © Nelson Thornes 2008 1AQA ICT AS Level © Nelson Thornes 2008

Firewalls and Virus Checkers

Page 2: 1 AQA ICT AS Level  Nelson Thornes 2008 1 Firewalls and Virus Checkers

2AQA ICT AS Level © Nelson Thornes 2008 2AQA ICT AS Level © Nelson Thornes 2008

Firewalls

What does a firewall do?

It checks the data coming into a computer system via the Internet against a set of rules or criteria, and only lets permitted material through.

It also helps to prevent unauthorised access to computer networks.

Page 3: 1 AQA ICT AS Level  Nelson Thornes 2008 1 Firewalls and Virus Checkers

3AQA ICT AS Level © Nelson Thornes 2008 3AQA ICT AS Level © Nelson Thornes 2008

They work by:

Allowing all traffic unless it does not meet certain criteria.

Allowing no traffic unless it meets certain criteria.

Basic criteria could be:• nature of the data• source of the data

Firewalls

Page 4: 1 AQA ICT AS Level  Nelson Thornes 2008 1 Firewalls and Virus Checkers

4AQA ICT AS Level © Nelson Thornes 2008 4AQA ICT AS Level © Nelson Thornes 2008

Firewalls can be hardware or software

Firewalls

Hardware

Software

Page 5: 1 AQA ICT AS Level  Nelson Thornes 2008 1 Firewalls and Virus Checkers

5AQA ICT AS Level © Nelson Thornes 2008 5AQA ICT AS Level © Nelson Thornes 2008

FirewallsFirewall software is usually included as part of the operating system.

Specialist firewall software can also be purchased, for example:

Page 6: 1 AQA ICT AS Level  Nelson Thornes 2008 1 Firewalls and Virus Checkers

6AQA ICT AS Level © Nelson Thornes 2008 6AQA ICT AS Level © Nelson Thornes 2008

How can organisations prevent unauthorised access?

A firewall can log all attempts to enter a private network. Multiple attempts may suggest unauthorised attempts. This warning would allow extra security to be put in place.

An audit trail is a record that shows who has accessed an ICT system and what they have done.

Avoid using the term hacking in an exam, as this is rather vague.

Unauthorised access

Page 7: 1 AQA ICT AS Level  Nelson Thornes 2008 1 Firewalls and Virus Checkers

7AQA ICT AS Level © Nelson Thornes 2008 7AQA ICT AS Level © Nelson Thornes 2008

Firewalls

How does the firewall in your own institution work?

How does your institution prevent access to unsuitable websites?

How does your institution prevent unauthorised access?

Page 8: 1 AQA ICT AS Level  Nelson Thornes 2008 1 Firewalls and Virus Checkers

8AQA ICT AS Level © Nelson Thornes 2008 8AQA ICT AS Level © Nelson Thornes 2008

Anti-virus software continually scans for viruses, including Trojans and Worms.

It must be kept up-to-date, though, as new viruses appear all the time.

Companies usually charge a subscription for updates.

Virus Checkers

Page 9: 1 AQA ICT AS Level  Nelson Thornes 2008 1 Firewalls and Virus Checkers

9AQA ICT AS Level © Nelson Thornes 2008 9AQA ICT AS Level © Nelson Thornes 2008

•Anti-virus software maintains a database of known viruses.•Incoming data files, through e-mail, downloads or removable media, are checked against the database.•Suspicious files are deleted or put into a safe quarantined area for further investigation.•Scheduled scans of all data files on the system can be done automatically.•Virus definitions need to be kept up-to-date and software subscriptions include regular downloads of updates.

Anti-virus software