Documente Academic
Documente Profesional
Documente Cultură
TECHNICALS
OCR LEVEL 3
CAMBRIDGE TECHNICAL
CERTIFICATE/DIPLOMA IN
IT
LEVEL 3 UNIT 28
www.ocr.org.uk 2
Networked systems security Level 3 Unit 28
1 Know the types and P1 describe how networks M1 explain reasons why
sources of network can be attacked networks can be
attacks attacked
2 Know about security P2 describe how M2 explain types of
related hardware and networked systems can security hardware
software be protected and software which
are used to protect
networks
3 Understand P3 explain what an D1 compare the
organisational aspects organisation can do effectiveness of security
of network security to minimise security measures used by
breaches in networked organisations
systems
4 Be able to apply system P4 plan procedures to M3 develop user D2 develop a test plan to
security secure a network documentation to test the security of the
enable users to secure a network system
network
P5 configure a networked
device or specialist
software to improve the
security of a network
3
TEACHING CONTENT
The unit content describes what has to be taught to ensure that learners are able to access the highest grade.
Anything which follows an i.e. details what must be taught as part of that area of content.
Anything which follows an e.g. is illustrative, it should be noted that where e.g. is used, learners must know and be able to apply
relevant examples to their work though these do not need to be the same ones specified in the unit content.
www.ocr.org.uk 4
Networked systems security Level 3 Unit 28
5
• securing networks - hardware
-- use of shielding, (transmission control)
-- intrusion detection, (e.g. alarms)
-- router
-- switch
-- wireless access points.
www.ocr.org.uk 6
Networked systems security Level 3 Unit 28
DELIVERY GUIDANCE
Know the types and sources of network attacks Tutors can use examples, such as when organisational systems
have been unavailable or slow because of the testing or
Learners must be taught about the different types of threats
checking. Examples such as these will enable learners to
to network security. This could be delivered through a
understand why interference with normal processing and
presentation of the different types of threats and how they
usage is one way in which users can become disaffected
affect networks i.e. what do they do. Learners could then
with security. It is important for learners to understand that
research “real life” examples of the different types of threats.
security systems which use too much user time or require
A group discussion could then follow on how these attacks are
irrelevant activities to be carried out can cause security plans
implemented and why the attacks are instigated e.g. external
to:
hacking to extract sensitive information, cyber terrorism
– attacking particular governments to try and destroy or • not be implemented properly
discredit them.
• not be implemented at all
Encouraging learners to research articles or recorded
• circumvented by the user.
discussions of real-life examples where threats have turned
into reality is a way to engage them. They in turn can conduct Understand organisational aspects of network security
further research, possibly working in teams, and present other
The tutor could begin by asking learners to review:
examples, which can be fed back to the whole group through
discussion or presentations. The tutor can use this activity • the knowledge that they have already gathered
to correct any misconceptions and fill in any gaps in the
• the restrictions and behaviours that they have to deal
knowledge demonstrated.
with when using the institutional, training or work based
Know about security related hardware and software information systems
Learners must have a good understanding of the constraints • creating lists of policies and procedures which these
and principles for designing network security measures, for represent.
example no user should have higher access levels than they
need to carry out their legitimate activities. Information It is important that tutors ensure that learners can
relating to the different hardware and software security differentiate between policies and procedures before
measures could be presented to the learners through a embarking on this activity.
presentation. An overview of the different security measures The learner must be introduced to the range of policies and
could be given, with the learners then having to consider procedures which can be used to minimise security breaches,
different “real life” examples of when the different measures these should include the policies and procedures identified in
are used, e.g. - use of card entry systems to access buildings the teaching content.
and rooms, for example the server room for a network is
normally protected by a lock or keypad. Learners should be Through a group discussion, learners could discuss the
taught about the different hardware and software available security measures implemented by different organisations
to support the securing of a network as per the teaching and compare their effectiveness as per the teaching content.
content. The learners must have an understanding of how
hardware and software can be configured and used to secure
different types of networks.
7
Be able to apply system security
It is important that learners understand the need to test
security measures and how the tests can be carried out.
Learners should be asked to consider the different security
threats and attacks that they have previously been taught and
their associated security measures. They should then think
about how these security measures could be tested. The
learners should be given guidance on what constitutes a good
test plan i.e. number of test, date of test, description of test,
anticipated result of test, actual test result, issues that have
occurred and the number of the re-test.
www.ocr.org.uk 8
Networked systems security Level 3 Unit 28
9
learners have the necessary training in the Health and Safety
aspects of working with live electronic equipment. Tutors will
need to be experienced in all of these areas in order to train
and support learners throughout the unit.
www.ocr.org.uk 10
Networked systems security Level 3 Unit 28
LINKS TO NOS
6.2 IT Security Management
11
CONTACT US
Staff at the OCR Customer Contact Centre are available to take your call
between 8am and 5.30pm, Monday to Friday.
We’re always delighted to answer questions and give advice.
www.ocr.org.uk 12