6.6 Logical Protection Flashcards
Usernames & Passwords
Usernames matched with a secure password to minimise the catches of unauthorised users accessing the system
Passwords should contain a mixture of letters, numbers, punctuation, should be lengthy and regularly changed
Anti-Malware
Anti-Virus software:
Scans a system and removes viruses
Virus
Could delete data or:
Permit access to unauthorised users
Anti-Spyware
removes spyware so hackers cannot view personal data
Organisations
Should install and regularly update ant-virus and anti-spyware programs
Firewall
Prevents unauthorised access to or from a network
Filter packets and block anything that is identified as harmful to a PC or network
Can block access to specific websites and programs
Can be software installed or a physical device
Encryption
conversion of data into an unreadable format so it cannot be understood if intercepted
Encrypted data can only be understood by an authorised system with a decryption key
Two types of encryption
Encryption at rest: Data encrypted while it is being stored on a system or storage drive
Encryption In transit: secure the data as it is being transferred between systems on a network
Tiered Levels Of Access
Grant different types of permission to certain users
Managing levels of file access ensure
Only authorised people can access and change certain files
Different levels of file access:
No access
Read-only: Can View but not edit
Read/Write: Can View and Edit
Obfuscation
Data is deliberately changed to be unreadable to humans but understandable to computers
Specialist software can be used to obfuscate data and convert it back into human-readable format
Obfuscation might be used to stop rival programmers from viewing and stealing it