6.6 Logical Protection Flashcards

1
Q

Usernames & Passwords

A

Usernames matched with a secure password to minimise the catches of unauthorised users accessing the system

Passwords should contain a mixture of letters, numbers, punctuation, should be lengthy and regularly changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anti-Malware

A

Anti-Virus software:

Scans a system and removes viruses

Virus

Could delete data or:

Permit access to unauthorised users

Anti-Spyware

removes spyware so hackers cannot view personal data

Organisations

Should install and regularly update ant-virus and anti-spyware programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewall

A

Prevents unauthorised access to or from a network

Filter packets and block anything that is identified as harmful to a PC or network

Can block access to specific websites and programs

Can be software installed or a physical device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption

A

conversion of data into an unreadable format so it cannot be understood if intercepted

Encrypted data can only be understood by an authorised system with a decryption key

Two types of encryption

Encryption at rest: Data encrypted while it is being stored on a system or storage drive

Encryption In transit: secure the data as it is being transferred between systems on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tiered Levels Of Access

A

Grant different types of permission to certain users

Managing levels of file access ensure

Only authorised people can access and change certain files

Different levels of file access:

No access

Read-only: Can View but not edit

Read/Write: Can View and Edit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Obfuscation

A

Data is deliberately changed to be unreadable to humans but understandable to computers

Specialist software can be used to obfuscate data and convert it back into human-readable format

Obfuscation might be used to stop rival programmers from viewing and stealing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly