Sunteți pe pagina 1din 12

Cambridge

TECHNICALS

OCR LEVEL 3
CAMBRIDGE TECHNICAL
CERTIFICATE/DIPLOMA IN

IT

NETWORKED SYSTEMS SECURITY


J/601/7332

LEVEL 3 UNIT 28

GUIDED LEARNING HOURS: 60

UNIT CREDIT VALUE: 10


NETWORKED SYSTEMS SECURITY
J/601/7332
LEVEL 3

AIM AND PURPOSE OF THE UNIT


On completion of this unit learners will know the range of
network attacks, where they originate and why. Learners will
be able to use this information to develop an understanding
of the ways in which networks can be protected and how
organisations can avoid or reduce their risk of attack and plan
security procedures to protect the network. Learners will also
have the necessary practical skills to configure hardware and
software to improve security against attack and carry out tests
on systems to confirm that the network system is secure from
potential attacks and threats.

www.ocr.org.uk 2
Networked systems security Level 3 Unit 28

ASSESSMENT AND GRADING CRITERIA

Learning Outcome (LO) Pass Merit Distinction


The assessment criteria are To achieve a merit the To achieve a distinction the
the pass requirements for evidence must show that, in evidence must show that,
this unit. addition to the pass criteria, in addition to the pass and
the learner is able to: merit criteria, the learner is
The learner will: The learner can: able to:

1 Know the types and P1 describe how networks M1 explain reasons why
sources of network can be attacked networks can be
attacks attacked
2 Know about security P2 describe how M2 explain types of
related hardware and networked systems can security hardware
software be protected and software which
are used to protect
networks
3 Understand P3 explain what an D1 compare the
organisational aspects organisation can do effectiveness of security
of network security to minimise security measures used by
breaches in networked organisations
systems
4 Be able to apply system P4 plan procedures to M3 develop user D2 develop a test plan to
security secure a network documentation to test the security of the
enable users to secure a network system
network
P5 configure a networked
device or specialist
software to improve the
security of a network

3
TEACHING CONTENT
The unit content describes what has to be taught to ensure that learners are able to access the highest grade.
Anything which follows an i.e. details what must be taught as part of that area of content.
Anything which follows an e.g. is illustrative, it should be noted that where e.g. is used, learners must know and be able to apply
relevant examples to their work though these do not need to be the same ones specified in the unit content.

LO1 - Know the types and sources of network attacks • firewalls


• types of threats -- hardware
-- external hacking -- anti-virus software.
-- internal hacking • intrusion detection.
-- malware; worms, viruses, spyware, Trojans, time bombs
LO3 - Understand organisational aspects of network
and Denial of Service attacks
security
-- theft of resources and equipment.
• risk assessment to establish minimum levels of access for
• reasons for carrying out attacks or hacking into systems
users
-- cyber terrorism
-- hacktivism • clarity and simplicity of security procedures
-- espionage, (industrial or international) -- effect of procedures on staff, (i.e. training requirements)
-- personal gain -- implementation/maintenance costs against lost time/
-- disgruntled employees trying to retaliate against the data recovery costs.
employer.
• different types of networks
LO2 - Know about security related hardware and -- wired
software -- Wi-Fi
Hardware -- LAN (Local Area Network)
-- WAN (Wide Area Network)
• security systems
-- MAN (Metropolitan Area Network)
-- physical, (e.g. key pad, card entry, surveillance cameras,
-- CAN (Campus Area Network)
fingerprint readers, locking equipment cabinets,
-- serve based networks
parallel systems, access control, circuit breakers, fuses)
-- peer to peer networks.
-- routers
-- switches • effectiveness of security measures
-- wireless access point. -- size of organisation
Software -- type of industry, (e.g. retail, finance, e-commerce etc)
-- external and internal security functions
• operating system security -- deterrent measures
-- confidentiality levels -- preventative measures.
-- integrity of software and data.
• policies
• software security -- guide decision making
-- passwords -- allow managerial discretion
-- user permissions -- integral part of organisational strategies
-- updates and patches. -- formulated by top management.
• LANS • procedures
-- authentication, (e.g. Wire Equivalence Privacy, WI-FI -- drive actions
Protected Access) -- detailed and rigid
-- access control, (e.g. Medium Access Control). -- tactical tools.
• encryption • examples of policies and procedures include:
-- symmetric, public key -- backup
-- encryption protocols, (e.g. Secure Socket Layer).

www.ocr.org.uk 4
Networked systems security Level 3 Unit 28

-- recovery • configuration change control and monitoring


-- data classification (e.g. public, confidential, • access restrictions.
commercially sensitive) -- contingency planning
-- authentication passwords, usernames • contingency policy and procedures
-- biometrics • contingency plan
-- physical security • contingency training
-- identify passes • contingency plan testing and exercises to be carried
-- key cards out
-- locked door or locked computer requirements • a range of contingency activities, (e.g. alternative
-- inappropriate website access policies e.g. storage sites, information system backup,
• pornographic and other inappropriate websites telecommunication services, information system
• mobile technology security recovery and rebuild)
• copying and downloading of software • control policies, (e.g. incident response,
• anti malware measures (e.g. up to date anti-malware maintenance, physical access, media protection,
software) personnel security, information input, error
• back up and back up locations handling, spam protection)
• data destruction • technical controls, (e.g. access management and
• the security software and hardware which can be enforcement, information flow, separation of duties.
implemented. Number of attempts at log in , period of time for
which failed attempts at log-in will count towards
LO 4 - Be able to apply system security
the total permitted number, remote access, wireless
• network security plan document to include: access restrictions, control of mobile devices
-- sections: including laptops).
• title page with organisation name, system -- test plan
identification, (e.g. name, identification code, name • create a test plan containing the following
of system security plan owner document version headings:
table) • test number
• system characteristics should include the following: • date of test
• system type • description of test
• system status • anticipated test result
• purpose of system • actual test result
• system interconnection and information sharing • issues
• programs and applications on system. • actions to be taken.
• applicable laws or regulations • the test plan should monitor system security
• security level elements including:
• protection requirements • level of staff training in correct security
• management controls including certification, procedures
accreditation, tasks and milestones, continuous • level of staff awareness of the need for security
monitoring as stated in the network security plan
• security planning policy and procedures • the level of contingency training
• rules of behaviour • what contingency plan testing has take place
• software usage restrictions • what contingency exercises have taking place
• user installed software. • what security issues have been identified and
-- operation controls to include: addressed
• security awareness and training and associated • the success or failure of the elements of the
policy and procedures security plan
• awareness courses • the success or failure of the elements of the
• security training for users and technical staff contingency plan.
• security training records

5
• securing networks - hardware
-- use of shielding, (transmission control)
-- intrusion detection, (e.g. alarms)
-- router
-- switch
-- wireless access points.

• securing networks - software


-- personal access control
-- setting protocols and access levels
-- encryption of files
-- configuring firewalls and anti-virus software.

www.ocr.org.uk 6
Networked systems security Level 3 Unit 28

DELIVERY GUIDANCE
Know the types and sources of network attacks Tutors can use examples, such as when organisational systems
have been unavailable or slow because of the testing or
Learners must be taught about the different types of threats
checking. Examples such as these will enable learners to
to network security. This could be delivered through a
understand why interference with normal processing and
presentation of the different types of threats and how they
usage is one way in which users can become disaffected
affect networks i.e. what do they do. Learners could then
with security. It is important for learners to understand that
research “real life” examples of the different types of threats.
security systems which use too much user time or require
A group discussion could then follow on how these attacks are
irrelevant activities to be carried out can cause security plans
implemented and why the attacks are instigated e.g. external
to:
hacking to extract sensitive information, cyber terrorism
– attacking particular governments to try and destroy or • not be implemented properly
discredit them.
• not be implemented at all
Encouraging learners to research articles or recorded
• circumvented by the user.
discussions of real-life examples where threats have turned
into reality is a way to engage them. They in turn can conduct Understand organisational aspects of network security
further research, possibly working in teams, and present other
The tutor could begin by asking learners to review:
examples, which can be fed back to the whole group through
discussion or presentations. The tutor can use this activity • the knowledge that they have already gathered
to correct any misconceptions and fill in any gaps in the
• the restrictions and behaviours that they have to deal
knowledge demonstrated.
with when using the institutional, training or work based
Know about security related hardware and software information systems
Learners must have a good understanding of the constraints • creating lists of policies and procedures which these
and principles for designing network security measures, for represent.
example no user should have higher access levels than they
need to carry out their legitimate activities. Information It is important that tutors ensure that learners can
relating to the different hardware and software security differentiate between policies and procedures before
measures could be presented to the learners through a embarking on this activity.
presentation. An overview of the different security measures The learner must be introduced to the range of policies and
could be given, with the learners then having to consider procedures which can be used to minimise security breaches,
different “real life” examples of when the different measures these should include the policies and procedures identified in
are used, e.g. - use of card entry systems to access buildings the teaching content.
and rooms, for example the server room for a network is
normally protected by a lock or keypad. Learners should be Through a group discussion, learners could discuss the
taught about the different hardware and software available security measures implemented by different organisations
to support the securing of a network as per the teaching and compare their effectiveness as per the teaching content.
content. The learners must have an understanding of how
hardware and software can be configured and used to secure
different types of networks.

7
Be able to apply system security
It is important that learners understand the need to test
security measures and how the tests can be carried out.
Learners should be asked to consider the different security
threats and attacks that they have previously been taught and
their associated security measures. They should then think
about how these security measures could be tested. The
learners should be given guidance on what constitutes a good
test plan i.e. number of test, date of test, description of test,
anticipated result of test, actual test result, issues that have
occurred and the number of the re-test.

Through a group discussion between the tutor and the class, a


plan should be devised to secure a given network. This could
be based on a type of organisation e.g. insurance company
who will store information relating to their customers i.e.
names, addresses, dates of birth, bank details etc. They could
be given a template of a network security planning document
to complete for the network.

The learners will need to consider what documentation


should be put into place to support the users who need to
apply the procedures. This can include the network managers
who have to put the security measures in place, to the staff
who have to use login procedures etc. This again could be
delivered by having an initial group discussion between the
tutor and the learners about who may need documentation
and why. The class could then work together in smaller
groups to develop user documentation for the different
personnel involved.

Learners should be given a network system where they have


to a) plan the security measures to be implemented using the
appropriate documentation, b) devise user documentation
so that the users can implement the security measures, c)
develop a test plan to test the security of the network system
after the security measures have been implemented.

www.ocr.org.uk 8
Networked systems security Level 3 Unit 28

SUGGESTED ASSESSMENT SCENARIOS AND TASK PLUS GUIDANCE ON


ASSESSING THE SUGGESTED TASKS
It should be noted that the evidence for a number of measures. They could provide this in a table format, a report or as
assessment criteria could be provided in a single report but a presentation with detailed speaker notes.
this is at the discretion of the tutor.
Assessment Criteria P4, M3 and D2
Assessment Criteria P1 and M1
P4 may be achieved by the learner producing a plan of
For P1, learners are required to describe how networks can be the necessary security procedures required to protect the
attacked. They must be able to provide at least one example network of a given system. The evidence will be the plan.
of each of the types of threats from the teaching content, but
For merit criterion M3 learners must produce documentation that
can present more examples. Learners could produce a report
will enable the staff involved in the security of the IT system to
or a presentation with detailed speaker notes. Alternatively
implement the planned security measures. The documentation
learners could produce a table with appropriate headings.
can be in either paper format, electronic, interactive presentation
For merit criterion M1 learners must explain the reasons why etc. Learners should ensure that the documentation is clear and
networks can be attacked and present their findings. This could easy to follow.
be an extension of their evidence for P1, explaining the type of
For distinction criterion D2 learners must produce a test plan
threats and why these attacks are carried out. This could be an
which can be used to test the security of the network. The test
extension to the report produced for P1 or an extension to the
plan must be detailed and include the headings identified in the
presentation. If the learner used the table format for P1, they
teaching content.
could produce a separate report or presentation.

Assessment Criteria P2, M2 Assessment Criterion P5


For P5, learners will need to configure a networked device
The learner could evidence P2 by creating a report,
or specialist software to improve the security of a network.
presentation with detailed speaker notes or a leaflet
Evidence could be presented in the form of annotated photos
describing how networked systems can be protected.
or screenshots supported by detailed assessor observation.
Learners may find it easier, if they give examples of different
threats, as produced as evidence for P1, and then provide a
description of how a network can be secured to prevent the
attacks taking place. SUGGESTED SCENARIOS
For merit criterion M2 learners must explain the types of security Learners could be given a scenario for a particular type of
hardware and software which are used to protect networks. organisation e.g. small travel agents who have 6 computers
They could provide the information in a report, presentation with on a wired network linked to a server. The information stored
detailed speaker notes or in a table. The evidence should include on the server includes: names, addresses and telephone
at least three different types of security hardware and three numbers of customers wishing to purchase a property as
different types of security software. well as the vendors (people selling properties). All of the
accounts information including the payroll is stored on the
Assessment Criteria P3, D1 server. The computers are used by the accounts manager, the
P3 could be achieved through learners producing a report office manager, two admin assistants and two qualified estate
or presentation with detailed speaker notes explaining what agents who conduct valuations on properties.
an organisation can do to minimise security breaches in
networked systems. Learners could be given a scenario for a
particular type of organisation. RESOURCES
For distinction criterion D1 learners must provide a comparison This unit requires that learners have access rights to the
of the effectiveness of security measures used by organisations. hardware and software of a network and also to any
They should compare organisations of different sizes and security components. They must be able to change and
types in order to provide a comparison of the external and monitor security settings. The access to hardware and the
internal security functions, deterrent measures and preventative opportunities to add or change components also requires that

9
learners have the necessary training in the Health and Safety
aspects of working with live electronic equipment. Tutors will
need to be experienced in all of these areas in order to train
and support learners throughout the unit.

Access to network systems is also important for learners to


carry out security hardware and software configurations,
and carry out the necessary learning activities for learning
outcome 4.

Learners may require internet access to conduct research on


“real life” security breaches.

www.ocr.org.uk 10
Networked systems security Level 3 Unit 28

MAPPING WITHIN THE


QUALIFICATION TO THE OTHER
UNITS
Unit 1 - Communication and employability skills for IT

Unit 4 - Managing networks

Unit 5 - Organisational systems security

Unit 7 - Computer networks

LINKS TO NOS
6.2 IT Security Management

6.3 IT Disaster Recovery

11
CONTACT US
Staff at the OCR Customer Contact Centre are available to take your call
between 8am and 5.30pm, Monday to Friday.
We’re always delighted to answer questions and give advice.

Telephone 02476 851509


Email cambridgetechnicals@ocr.org.uk
www.ocr.org.uk

www.ocr.org.uk 12

S-ar putea să vă placă și