Equipment

 Homework Task 1. Read Potts et.al Network security Ch 3 pp 108-110 and Ch 8 Security Equipment pp231-242. Complete questions p117 Network Security and p 256 Security Equipment 2. Make sure you update your glossary you should have an understanding of all the words below. 3. You will become an expert in one of these areas. We will discuss and allocate this before end of term. You need to produce a PowerPoint presentation summarising your area after you have done research. Some resources have been provided but you need to come up with at least 2 other resources.This will be presented first day next term. This is part of Unit 4 SAC 2. []
 * SECURITY EQUIPMENT **
 * Other resources**

[|Biometrics.pptx] || Potts et. al Ch 8 pp 231-232 || []
 * **Equipment** || **Text Resources** || **Other Resources** || **Possible Questions** || **Student** ||
 * //**Biometrics**//

Fingerprint articles[]

[] []

[]

Face recognition software [] || Biometrics refers to the automatic identification of a person based on certain physiological or behavioural characteristics. They are input devices which require hardware and software.  Give some examples of biometric devices that have been developed and how they are used to secure data. || Rachel || || Potts et. al Ch 8 pp 232-233 || []
 * **//Digital Signatures, Swipe Cards, Smart Cards, Security Tokens//**

[]

[]

Digital Signatures [] || Explain what a digital signature is and how it works.

Explain how these technologies work. || Piyumi || Online BackUp//** || Potts et. al Ch 8 pp 234-236 || []
 * **//Backup Media

Online/Remote backup

[] || Give examples of magnetic, optical and steady state storage devices. What type of backup hardware would you use to backup: q  Your school assignment q  Your home computer q  File server of a small organisation q  File server of a large organisation What is remote backup? (or on-line backup) || Danielle ||
 * **//Surveillance//** || Potts et. al Ch 8 pp 237-239 || []

[]

[]

[] || What are the following ·  Desktop monitoring programs (Observe what we have at school) ·  Log files ·  Closed-circuit TV  ·   Telephone monitoring ·  Audit trails How does surveillance work in the workplace? || Rebecca ||
 * **//Physical Security Devices(*)//** || Potts et. al Ch 8 pp 239 ||  ||   || Justine ||
 * **//Power protection and avoiding system failure//**
 * **//surge protection//**
 * **//UPS//**
 * **//multiple hard drives//**
 * **//mirror server//**
 * **//RAID//**
 * **//Online backups//** || Potts et. al Ch 8 pp 233-234

Potts et. al Ch 8 pp 236-237 || Online backup []

[] ||  || Thao || Potts et. al Ch 8 pp 236-237 || [] || Encryption is the action of encoding or “scrambling” information so that it is no longer easily readable. –**Symmetric encryption**-relies on both sender and receiver of message knowing the key. –**Asymmetric or public key encryption**-uses different keys to encrypt and decrypt. Users are given a public key to encrypt and a private key used to decrypt the message. How does encryption software work? What is Symmetric encryption? How does it work? What is Public key encryption? How does it work? || Alex || Potts et. al Ch 8 pp 236-237 || [] [] [] [] || How do trojans, email viruses and worms work? Give some examples of each? What's difference between antivrus and spyware? What is a hoax? spam?Phishing? || Leisha Millanta || Potts et. al Ch 8 pp 242 || []
 * **//Encryption software//**
 * **//public key//**
 * **//private key//** || Potts et. al Ch 3 pp 109-110
 * **//Malware//**
 * **//anti-virus software//**
 * **//spyware and adware protection//** || Potts et. al Ch 3 pp 109
 * **//Firewall (can be hardware and software) (*)//** || Potts et. al Ch 3 pp 109

[] || What is a firewall? <span style="font-size: 10pt; font-family: 'Times New Roman','serif'; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US; mso-ansi-language: EN-AU; mso-bidi-language: AR-SA;">Use a diagram to help explain how firewalls work? Give some examples of firewalls on the market. || Justine || Potts et. al Ch 8 pp 241 ||  ||   || Justine ||
 * **//Network software (*)//**
 * **//password protection//**
 * **//policies and profiles//** || Potts et. al Ch 3 pp 108